WO2020124447A1 - 面向多卡的网络管理 - Google Patents

面向多卡的网络管理 Download PDF

Info

Publication number
WO2020124447A1
WO2020124447A1 PCT/CN2018/122131 CN2018122131W WO2020124447A1 WO 2020124447 A1 WO2020124447 A1 WO 2020124447A1 CN 2018122131 W CN2018122131 W CN 2018122131W WO 2020124447 A1 WO2020124447 A1 WO 2020124447A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
user identification
identification module
service
data
Prior art date
Application number
PCT/CN2018/122131
Other languages
English (en)
French (fr)
Inventor
王皓
姚松平
李锋
郭兴民
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2018/122131 priority Critical patent/WO2020124447A1/zh
Priority to CN201880100240.5A priority patent/CN113243126B/zh
Publication of WO2020124447A1 publication Critical patent/WO2020124447A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • H04W36/30Reselection being triggered by specific parameters by measured or perceived connection quality data
    • H04W36/302Reselection being triggered by specific parameters by measured or perceived connection quality data due to low signal strength

Definitions

  • the present application relates to the communication field, and in particular, to a network management method for a terminal and a corresponding terminal.
  • SIM cards For example, two data cards belong to different operators, one card is China Mobile and the other card is China Unicom.
  • multi-path transmission control protocol multipath transmission control protocol
  • MPTCP multipath transmission control protocol
  • MPUDP multi-path user datagram protocol
  • DSDS dual card dual standby
  • DSDA dual card dual pass
  • card 1 search LTE Cell
  • the data service experience of card 2 represents the current user experience, which should be protected, and if card 1 is the main card set by the user according to the traffic factor, the timeliness of card 1 data service recovery is also related to the cost of use and future users Experience.
  • Embodiments of the present application provide a terminal-oriented network management mechanism, such as a network search scheduling method, which can take into account both traffic cost and future user experience under the condition of guaranteeing the current user data service experience.
  • Multi-card refers to multiple subscriber identification modules, which can be either physically separated multiple cards or multiple virtual cards divided on one digital subscriber identification card (eSIM), for example.
  • eSIM digital subscriber identification card
  • a network management method for a terminal for example, a network search scheduling method
  • the terminal has at least two user identification modules, including a first user identification module and a second user identification module
  • the network management method includes: enabling a terminal to run a first data service on a second user identification module, detecting a network occupancy rate of the first data service, and determining a network search method of the first user identification module based on the network occupancy rate.
  • Network occupancy includes, for example, network usage frequency and/or throughput.
  • the first data service refers to, for example, a service included in the white list set in the terminal.
  • the white list service refers to a data service that the terminal can approve and is delay-sensitive.
  • the delay-sensitive standard can be customized by the user of the terminal, for example, set in the terminal through a graphical user interface, or can be preset by the terminal at the factory, or can be received from an external source such as a cloud or a server during the operation of the terminal Rules, etc.
  • the white list can be set in the terminal as a configuration file, can also be integrated into a program as code, and so on. It should be understood that the search method does not mean that the search must be performed. You can decide not to search the web according to the needs of the scene.
  • the method for detecting the network occupancy rate of the first data service may be, for example, calculating the average value according to the network occupancy rate of the first data service in a specific time period. The specific duration is 5s, for example.
  • the network type of the first user identification module is detected, and in response to the detection result, when the network type is no network, the first network search mode is used to search the first network. Under the condition that the network type is a second network different from the first network, the second network search method is used to search the first network, which is different from the first network search method.
  • the first network is an LTE network or a communication network that appears later than LTE, such as a 5G network.
  • the second network is a 2G network.
  • the first network search method includes: when the network occupancy rate is lower than the network occupancy rate threshold, enabling the first user identification module to search the first network.
  • the network is searched until the first duration, and then the step of detecting the network occupancy rate of the first data service is returned.
  • the first duration is, for example, 5s.
  • the first web search method includes: checking whether the preset timer times out under the condition that the network occupancy rate is not lower than the network occupancy threshold, and closing the first when the timer does not time out
  • the user identification module searches the first network.
  • the timer times out when the timer times out, the timer is reset and the first user identification module searches the first network.
  • the search network is closed until the second duration, and the step of detecting the network occupancy rate of the first data service is returned.
  • the second duration is, for example, 5s.
  • the network is searched until the first duration, and the step of detecting the network occupancy rate of the first data service is returned.
  • the first duration is 5s, for example.
  • Resetting the timer means resetting the timer to zero.
  • “turn off the search of the first network by the first user identification module” it should be understood here to include: the first user identification module is currently searching for the network, and the search is stopped; and, the first user identification module is not currently searching If you search the Internet, you will not open it.
  • the opening of the search network should be understood as including: the first user identification module is currently searching the network, and the search network is not stopped; and, the first user identification module is not currently searching the network, and the search network is started.
  • the second network search method includes: when the network occupancy rate is lower than the network occupancy threshold, enabling the first user identification module to search the first network.
  • the network is searched until the third duration, and the step of detecting the network occupancy rate of the first data service is returned.
  • the third duration is 5s, for example.
  • the second network search method includes: when the network occupancy rate is not lower than the network occupancy threshold, turning off the first user identification module's search for the first network.
  • the search network is turned off until the fourth duration, and the step of detecting the network occupancy rate of the first data service is returned.
  • the fourth duration is, for example, 5s.
  • the network management method further includes: determining whether the first data service is turned off or switched to the background, in response to the first data service being turned off or switched to the background, or the terminal locks the screen, and the first user identification module is turned on Search the first network.
  • the first data service running on the second user identification module is deactivated in response to the first data service being closed or switched to the background, or the terminal locks the screen.
  • a first data path is established on the first user identification module to run the switch to the foreground First data service.
  • the second data service that is set to the foreground and the first data service that is turned off or switched to the background may be the same or different.
  • the first data service and the second data service refer to services included in the white list set in the terminal, for example.
  • the white list service refers to a data service that the terminal can approve and is delay-sensitive.
  • the delay-sensitive standard can be customized by the user of the terminal, for example, set in the terminal through a graphical user interface, or can be preset by the terminal at the factory, or can be received from an external source such as a cloud or a server during the operation of the terminal Rules, etc., this application does not limit the setting method.
  • the white list can be set in the terminal as a configuration file, or can be integrated into a program as code.
  • the application does not limit the storage and implementation of the white list.
  • the first user identification module may be searched and/or the first user data module of the second user identification module may be activated, and then wait until the second data service is set To the front desk, the first data path is established in the first user identification module.
  • the web search of the first user identification module is not performed nor the first data service of the second user identification module is activated, and the second data service is still waiting. Set to the foreground and establish the first data path in the first user identification module.
  • the MPTCP/MPUDP protocol allows the terminal to be on two different networks Smooth switching, so by establishing a first data path on the first user identification module, the first data service can be smoothly transferred to the first user identification module, so that when the first data service is switched back to the foreground or reactivated, the user In terms of experience, it runs smoothly and continuously.
  • the network management method further includes: checking whether service experience data of the first data service that is updated within the last fifth time period is available.
  • the fifth duration is, for example, 1 min, and the latest fifth duration refers to pushing back 1 min from the time of the inspection.
  • the network occupancy rate is not lower than the network occupancy threshold means that the network usage frequency is not lower than the network usage frequency threshold and the throughput is not lower than the throughput threshold.
  • the service experience threshold in response to the service experience data of the first data service that is updated in the last fifth time period being available, it is checked whether the service experience is not lower than the first service experience threshold based on the service experience data.
  • “Business experience is not lower than the first business experience threshold” refers to that the business experience is as good or better than the first business experience threshold.
  • satisfying the service experience threshold means that the round-trip delay of the service is not higher than the preset round-trip delay threshold.
  • the link quality of the second user identification module in response to the lack of service experience data of the first data service updated within the latest fifth time period, it is checked whether the link quality of the second user identification module is not lower than the first link quality threshold.
  • the link quality of the second user identification module in response to the service experience being lower than the first service experience threshold, or in response to the link quality being lower than the first link quality threshold, is identified with the first user Comparing the link quality of the modules, in response to the link quality of the first user identification module being below the link quality of the second user identification module, returning to the step of detecting the service experience and link quality of the second user identification module.
  • the link quality of the first user identification module is stored in the terminal, for example, the link quality of the first user identification module last recorded before switching to the second user identification module.
  • “Business experience is lower than the first business experience threshold" means that the business experience is worse than the first business experience threshold.
  • the first user identification module in response to the link quality of the first user identification module being higher than the link quality of the second user identification module, the first user identification module searches the first network. In some possible implementations, in response to the link quality of the first user identification module being higher than the link quality of the second user identification module, the first data service running on the second user identification module is deactivated. In some possible implementations, in response to the link quality of the first user identification module being higher than the link quality of the second user identification module, a first data path is established on the first user identification module and the first data service is transferred To the first user identification module. In some possible implementations, the link quality of the first user identification module is stored in the terminal, for example, the link quality of the first user identification module last recorded before switching to the second user identification module.
  • the web search of the first user identification module may be started and/or the first data service may be deactivated on the second user identification module , And then switch to the first user identification module to establish the first data path. It is also possible to directly switch to the first user identification module without searching the first user identification module or deactivating the first data service on the second user identification module. Because the user experience of the second user identification module does not meet the threshold at this time, the link quality of the first user identification module before switching to the second user identification module is higher, so even if the first user identification module is not searched first You can also switch back to the first user identification module to try whether the experience is better than the second user identification module. Since the MPTCP/MPUDP protocol allows smooth network switching, even if the first data service is not activated on the second user identification module first, it is expected that the first data service can be smoothly switched to the first user identification module without confusion.
  • the network management method further includes: in response to the first data service being set to the foreground, establishing a first data path on the first user identification module to run the first data service, and checking whether there is a recent sixth The service experience data of the first data service updated within the duration is available.
  • the sixth duration is, for example, 1 min, and the latest sixth duration refers to pushing back 1 min from the time of the inspection.
  • the service experience data of the first data service that is updated in the latest sixth time period being available, it is checked whether the service experience is not lower than the second service experience threshold based on the service experience data.
  • the service experience is not lower than the second service experience threshold means that the service experience is as good or better than the second service experience threshold.
  • satisfying the service experience threshold means that the round-trip delay of the service is not higher than the preset round-trip delay threshold.
  • the link quality of the second user identification module is not lower than the second link quality threshold in response to the lack of service experience data of the first data service updated within the latest sixth time period.
  • in response to the service experience not lower than the second service experience threshold returning to the step of checking whether the service experience data of the first data service updated within the latest sixth time period is available.
  • in response to the link quality not lower than the second link quality threshold return to the step of checking whether the service experience data of the first data service updated within the latest sixth time period is available.
  • a second data path is established on the second user identification module and the The first data service is migrated to the second user identification module.
  • the search of the first user identification module is also turned off.
  • it is also determined whether it is not lower than the aging time, and not lower than the aging time The second data path is established on the second user identification module only under the condition that the first data service is migrated to the second user identification module.
  • the physical meaning of the aging time is the time from the last time when the first user identification module is switched to the second user identification module to the time when the aging time is judged this time.
  • the specific value may be defined by the terminal or defined by the user via the terminal. The specific value may also be received by the terminal from the outside, for example, from a cloud server.
  • a terminal having at least two user identification modules, including a first user identification module and a second user identification module, the terminal further includes: a memory and a processor coupled to the memory, the memory storing The instructions executable by the processor call the instructions in the memory to execute the network management method according to any one of the embodiments of the first aspect of the present application.
  • the terminal may also include a transceiver device, which detects the network occupancy rate of the data service and sends it to the processor.
  • the network management method performed by the terminal includes: running the first data service on the second user identification module, detecting the network occupancy rate of the first data service, and determining the network search method of the first user identification module based on the network occupancy rate .
  • Network occupancy includes, for example, network usage frequency and/or throughput.
  • the first data service refers to, for example, a service included in the white list set in the terminal.
  • the white list service refers to a data service that the terminal can approve and is delay-sensitive.
  • the delay-sensitive standard can be customized by the user of the terminal, for example, set in the terminal through a graphical user interface, or can be preset by the terminal at the factory, or can be received from an external source such as a cloud or a server during the operation of the terminal Rules, etc.
  • the white list can be set in the terminal as a configuration file, can also be integrated into a program as code, and so on. It should be understood that the search method does not mean that the search must be performed. You can decide not to search the web according to the needs of the scene.
  • the method for detecting the network occupancy rate of the first data service may be, for example, calculating the average value according to the network occupancy rate of the first data service in a specific time period. The specific duration is 5s, for example.
  • the network type of the first user identification module is detected, and in response to the detection result, when the network type is no network, the first network search mode is used to search the first network. Under the condition that the network type is a second network different from the first network, the second network search method is used to search the first network, which is different from the first network search method.
  • the first network is an LTE network or a communication network that appears later than LTE, such as a 5G network.
  • the second network is a 2G network.
  • the first network search method includes: when the network occupancy rate is lower than the network occupancy rate threshold, enabling the first user identification module to search the first network.
  • the network is searched until the first duration, and then the step of detecting the network occupancy rate of the first data service is returned.
  • the first duration is, for example, 5s.
  • the first web search method includes: checking whether the preset timer times out under the condition that the network occupancy rate is not lower than the network occupancy threshold, and closing the first when the timer does not time out
  • the user identification module searches the first network.
  • the timer times out when the timer times out, the timer is reset and the first user identification module searches the first network.
  • the search network is closed until the second duration, and the step of detecting the network occupancy rate of the first data service is returned.
  • the second duration is, for example, 5s.
  • the network is searched until the first duration, and the step of detecting the network occupancy rate of the first data service is returned.
  • the first duration is 5s, for example.
  • Resetting the timer means resetting the timer to zero.
  • “turn off the search of the first network by the first user identification module” it should be understood here to include: the first user identification module is currently searching for the network, and the search is stopped; and, the first user identification module is not currently searching If you search the Internet, you will not open it.
  • the opening of the search network should be understood as including: the first user identification module is currently searching the network, and the search network is not stopped; and, the first user identification module is not currently searching the network, and the search network is started.
  • the second network search method includes: when the network occupancy rate is lower than the network occupancy threshold, enabling the first user identification module to search the first network.
  • the network is searched until the third duration, and the step of detecting the network occupancy rate of the first data service is returned.
  • the third duration is 5s, for example.
  • the second network search method includes: when the network occupancy rate is not lower than the network occupancy threshold, turning off the first user identification module's search for the first network.
  • the search network is turned off until the fourth duration, and the step of detecting the network occupancy rate of the first data service is returned.
  • the fourth duration is, for example, 5s.
  • the network management method further includes: determining whether the first data service is turned off or switched to the background, in response to the first data service being turned off or switched to the background, or the terminal locks the screen, and the first user identification module is turned on Search the first network.
  • the first data service running on the second user identification module is deactivated in response to the first data service being closed or switched to the background, or the terminal locks the screen.
  • a first data path is established on the first user identification module to run the switch to the foreground First data service.
  • the second data service that is set to the foreground and the first data service that is turned off or switched to the background may be the same or different.
  • the first data service and the second data service refer to services included in the white list set in the terminal, for example.
  • the white list service refers to a data service that the terminal can approve and is delay-sensitive.
  • the delay-sensitive standard can be customized by the user of the terminal, for example, set in the terminal through a graphical user interface, or can be preset by the terminal at the factory, or can be received from an external source such as a cloud or a server during the operation of the terminal Rules, etc., this application does not limit the setting method.
  • the white list can be set in the terminal as a configuration file, or can be integrated into a program as code.
  • the application does not limit the storage and implementation of the white list.
  • the first user identification module may be searched and/or the first user data module of the second user identification module may be activated, and then wait until the second data service is set To the front desk, the first data path is established in the first user identification module.
  • the web search of the first user identification module is not performed nor the first data service of the second user identification module is activated, and the second data service is still waiting. Set to the foreground and establish the first data path in the first user identification module.
  • the MPTCP/MPUDP protocol allows the terminal to be on two different networks Smooth switching, so by establishing a first data path on the first user identification module, the first data service can be smoothly transferred to the first user identification module, so that when the first data service is switched back to the foreground or reactivated, the user In terms of experience, it runs smoothly and continuously.
  • the network management method further includes: checking whether service experience data of the first data service that is updated within the last fifth time period is available.
  • the fifth duration is, for example, 1 min, and the latest fifth duration refers to pushing back 1 min from the time of the inspection.
  • the network occupancy rate is not lower than the network occupancy threshold means that the network usage frequency is not lower than the network usage frequency threshold and the throughput is not lower than the throughput threshold.
  • the service experience threshold in response to the service experience data of the first data service that is updated in the last fifth time period being available, it is checked whether the service experience is not lower than the first service experience threshold based on the service experience data.
  • “Business experience is not lower than the first business experience threshold” refers to that the business experience is as good or better than the first business experience threshold.
  • satisfying the service experience threshold means that the round-trip delay of the service is not higher than the preset round-trip delay threshold.
  • the link quality of the second user identification module in response to the lack of service experience data of the first data service updated within the latest fifth time period, it is checked whether the link quality of the second user identification module is not lower than the first link quality threshold.
  • in response to the service experience not being lower than the first service experience threshold returning to the step of checking whether the service experience data of the first data service updated within the last fifth time period is available.
  • in response to the link quality not lower than the first link quality threshold returning to the step of checking whether the service experience data of the first data service updated within the latest fifth time period is available.
  • the link quality of the second user identification module in response to the service experience being lower than the first service experience threshold, or in response to the link quality being lower than the first link quality threshold, is identified with the first user Comparing the link quality of the modules, in response to the link quality of the first user identification module being below the link quality of the second user identification module, returning to the step of detecting the service experience and link quality of the second user identification module.
  • the link quality of the first user identification module is stored in the terminal, for example, the link quality of the first user identification module last recorded before switching to the second user identification module.
  • “Business experience is lower than the first business experience threshold" means that the business experience is worse than the first business experience threshold.
  • the first user identification module in response to the link quality of the first user identification module being higher than the link quality of the second user identification module, the first user identification module searches the first network. In some possible implementations, in response to the link quality of the first user identification module being higher than the link quality of the second user identification module, the first data service running on the second user identification module is deactivated. In some possible implementations, in response to the link quality of the first user identification module being higher than the link quality of the second user identification module, a first data path is established on the first user identification module and the first data service is transferred To the first user identification module. In some possible implementations, the link quality of the first user identification module is stored in the terminal, for example, the link quality of the first user identification module last recorded before switching to the second user identification module.
  • the web search of the first user identification module may be started and/or the first data service may be deactivated on the second user identification module , And then switch to the first user identification module to establish the first data path. It is also possible to directly switch to the first user identification module without searching the first user identification module or deactivating the first data service on the second user identification module. Because the user experience of the second user identification module does not meet the threshold at this time, the link quality of the first user identification module before switching to the second user identification module is higher, so even if the first user identification module is not searched first You can also switch back to the first user identification module to try whether the experience is better than the second user identification module. Since the MPTCP/MPUDP protocol allows smooth network switching, even if the first data service is not activated on the second user identification module first, it is expected that the first data service can be smoothly switched to the first user identification module without confusion.
  • the network management method further includes: in response to the first data service being set to the foreground, establishing a first data path on the first user identification module to run the first data service, and checking whether there is a recent sixth The service experience data of the first data service updated within the duration is available.
  • the sixth duration is, for example, 1 min, and the latest sixth duration refers to pushing back 1 min from the time of the inspection.
  • the service experience data of the first data service that is updated in the latest sixth time period being available, it is checked whether the service experience is not lower than the second service experience threshold based on the service experience data.
  • the service experience is not lower than the second service experience threshold means that the service experience is as good or better than the second service experience threshold.
  • satisfying the service experience threshold means that the round-trip delay of the service is not higher than the preset round-trip delay threshold.
  • the link quality of the second user identification module is not lower than the second link quality threshold in response to the lack of service experience data of the first data service updated within the latest sixth time period.
  • in response to the service experience not lower than the second service experience threshold returning to the step of checking whether the service experience data of the first data service updated within the latest sixth time period is available.
  • in response to the link quality not lower than the second link quality threshold return to the step of checking whether the service experience data of the first data service updated within the latest sixth time period is available.
  • a second data path is established on the second user identification module and the The first data service is migrated to the second user identification module.
  • the search of the first user identification module is also turned off.
  • the physical meaning of the aging time is the time from the last time when the first user identification module is switched to the second user identification module to the time when the aging time is judged this time.
  • the specific value may be defined by the terminal or defined by the user via the terminal. The specific value may also be received by the terminal from the outside, for example, from a cloud server.
  • a computer storage medium including computer instructions, which, when run on a terminal, cause the terminal to perform the network management method in any possible implementation manner of the first aspect.
  • a computer program product which, when the computer program product is run on a terminal, causes the terminal to execute the network management method in any possible implementation manner of the first aspect.
  • FIG. 1 is a flowchart of a network management method provided by an embodiment of the present application.
  • FIG. 2 is a detailed description of step 130A in FIG.
  • Figure 3A is a scenario where the network occupancy rate does not meet the threshold.
  • Figure 3B is a scenario where the network occupancy rate meets the threshold.
  • FIG. 4 is a detailed description of step 130B in FIG. 1.
  • FIG. 5 is a detailed description of step 130C in FIG. 1.
  • FIG. 6 shows a method for migrating target data services to the card 2 for operation.
  • FIG. 7 shows an overview of the network management method provided by an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
  • FIG. 9 is a block diagram of a software structure of an electronic device according to an embodiment of the invention.
  • the user identification module which securely stores the International Mobile Subscriber Identification Number (IMSI) and related secret keys, is used to identify and authenticate users on mobile terminals in the mobile communication network.
  • the user identification module may be composed of an integrated circuit or software.
  • the user identification module is implemented as a SIM card, for example.
  • Searching the network refers to searching for a suitable wireless signal coverage area for the terminal to perform data services. If the target wireless signal coverage area is in the LTE network, the network search refers to the cell search procedure (cell search procedure) that the UE must go through to access the LTE network, in order to find a cell suitable for camping. If the target wireless signal coverage area is in a 5G network, network search also refers to finding a suitable cell to camp on.
  • the cell search procedure cell search procedure
  • 5G network search also refers to finding a suitable cell to camp on.
  • Round-trip time refers to the total delay experienced from the sending end sending data to the sending end receiving the confirmation from the receiving end (the receiving end sends the confirmation immediately after receiving the data).
  • SNR Signal-to-noise ratio
  • Reference signal received power is defined as the linear average of the received power (in watts) on the resource element (RE) carrying the reference signal over the measured frequency bandwidth. It is a key parameter that can represent wireless signal strength in LTE network.
  • Subscriber identification card (subscriber identity module, SIM) is mainly used to store user identification data, short message data and phone number of smart cards.
  • Data path refers to the data message transmission connection between the mobile terminal and the base station.
  • the technical solutions of the embodiments of the present application are applicable to any portable communication terminal that can be implemented with a wireless communication function, including: portable terminal, mobile terminal, communication terminal, portable communication terminal, portable mobile terminal, display device, and so on.
  • the terminal may correspond to a smart phone, a portable phone, a game machine, a TV, a display unit, a head-up display unit for a vehicle, a notebook computer, a laptop computer, a tablet personal computer (PC), personal media Player (PMP) player, personal digital assistant (PDA), etc.
  • the terminal may communicate with an external electronic device such as a server, or perform operations by interworking with the external electronic device.
  • the network may be a mobile or cellular communication network.
  • FIG. 1 shows a flowchart of a network management method provided by an embodiment of the present application.
  • the network management method 100 is used for making network search strategies for terminals, for example, for smart phones.
  • the terminal has, for example, two user identification modules, such as two SIM cards, hereinafter referred to as card 1 and card 2.
  • the terminal can support two standards, so card 1 and card 2 can be operated by different mobile communication operators.
  • the multi-channel technology can be applied to a dual-card environment.
  • the service first uses one of the cards to establish the first MPTCP data path (FirstFlow).
  • the second MPTCP data path (SecondFlow), so as to smoothly switch the data flow of the service to another card or two cards and send data redundantly at the same time, in order to make full use of the network capabilities of the two operators and ensure the best service communication Experience.
  • the terminal may have a set of radio frequency devices to support the data services of Card 1 and Card 2 in a time-multiplexed manner, or two sets of radio frequency devices dedicated to Card 1 and Card 2, respectively.
  • the SIM card may be two physically separated physical SIM cards inserted into the terminal card slot, or an eSIM card integrated into the terminal, then the two user identification modules may be logically divided on the eSIM card Two cards.
  • the terminal may also have more than two SIM cards.
  • the traffic contract on card 1 makes the cost of running data services more economical, so the end user sets it as the main card, that is, the card 1 can reside on the LTE network or the new generation network, for example In the 5G network, priority is given to using card 1 to run data services.
  • This setting can be operated via a graphical user interface, for example.
  • set card 2 as a secondary card, and manually or automatically switch to card 2 when the network quality of card 1 cannot support the service experience that reaches the threshold, so as to smoothly switch the data service on card 1 to MPTCP/MPUDP protocol To ensure the uninterrupted service experience of the user on the card 2, or to run a new data service on the card 2.
  • the card 2 may not be suitable for permanently running data services due to traffic charges, personal needs, and other reasons. Therefore, when the card 2 runs the data service, the terminal will search the card 1 network, for example, to search for a cell suitable for camping in the LTE network. In the future, the 5G network will also search for a 5G network area suitable for camping, so as to switch back to the card in time when it is found. 1 Run data services. However, when using card 2 to run a data service, card 2 represents the current user experience, and the network search of card 1 will preempt the limited air interface resources, thereby affecting the experience on card 2.
  • the search of the card 1 will cause a significant deterioration of the card 2 experience.
  • a delay of more than 150ms will cause the user to experience an operation response that is delayed for the hand-to-mouse operation.
  • voice/video calls a delay of more than 300ms makes the user experience the call partner The response of his voice is slow.
  • the network management method provided in the embodiment of the present invention shown in FIG. 1 provides different web search methods according to different operating scenarios of the terminal, so as to effectively search the web under the condition of ensuring the user's current experience.
  • Step 110 describes that the card 2 is currently running the target data service.
  • the target data service may be a delay-sensitive service, such as playing video games.
  • the network occupancy rate of the electronic game is detected.
  • the network occupancy rate in this application refers to the occupancy of the network by the target data service, including frequency and bandwidth.
  • the detection method is to track the network occupancy rate of the last 5s, and then take the average value in time.
  • the network occupancy rate includes network usage frequency and throughput.
  • the network usage frequency refers to the transmission frequency of data packets in a specific time period. The calculation method is, for example, within 5s, if there are packets per second, the network usage frequency is 100%. If only 4s are sent, the network usage frequency is 4/5, which is 80. %.
  • Throughput refers to the amount of data sent per unit time, such as the number of bits sent per unit time.
  • step 130A the corresponding network management is performed according to the current network type of the card 1.
  • step 130B network management is performed according to the user experience of the target data service on the card 2.
  • step 130C network management is performed in response to the target data service leaving the foreground. When the target data service leaves the foreground, the target data service is switched to the background, the target data service is closed, and the terminal locks the screen.
  • FIG. 2 is a detailed description of step 130A in FIG. 1, that is, how to perform the corresponding network search scheduling according to the current network type of the card 1.
  • step 201 the network type in which the card 1 is currently located is detected.
  • the card 1 is in a network that can perform basic services, such as making and receiving calls, but is not a target network
  • the card 2 has a target data service network with a low occupancy rate.
  • the card 1 is currently on the 2G network
  • the target of the search network is the 4G network.
  • the goal of the search network is a 5G network.
  • the game is still used as the target data service.
  • the sparseness of the data packet transmission is obtained through the network usage frequency to determine whether the target data service is running and the running status.
  • the current game business is, for example, a scenario where a player (ie, a user) chats in the preparation room and waits for a match. Player 1 asks whether player 2 has reached the same preparation room, and player 2 replies after a few seconds that he has arrived.
  • the network occupancy rate does not meet the preset network occupancy threshold, for example, the network usage frequency does not meet the preset 80% threshold, and the throughput does not meet the preset threshold due to the small amount of data in the text chat unit time.
  • the card 1 search network is started.
  • the web search is started at step 202 of FIG. 2 until a specific time period, for example, 5s, and then returns to step 120 of FIG. 1 to collect the latest network occupancy rate again.
  • the card 1 may also be searched.
  • the data is dense, for example, packets are sent every second in 5s, as shown in Figure 3B.
  • the game has started and the player has entered a tense combat state.
  • the network usage frequency is 100%, which exceeds the preset threshold, and the throughput also exceeds the preset threshold due to dense and regular data flow, so that the network occupancy rate is not lower than the preset network occupancy threshold.
  • the card 1 search network causes the game running on card 2 to delay more than 200ms, the player will feel a lag, and more than 150ms will feel that they are not following, that is, the response of the game after the mouse or keyboard operation is not immediate, and there is a delay .
  • the main card search network is closed.
  • the network search of the card 1 is turned off until a certain period of time, for example, 5s, and then returns to step 120 in FIG. 1, that is, the latest network occupancy rate is detected again.
  • the parties of the call are arguing, and the network usage frequency and throughput both exceed the threshold, which also triggers the card 1 to close the network.
  • closing the main card search network includes: if the main card is currently searching the network, stop the search network; if the main card is not currently searching the network, it will not start its search network. Opening the search network should also be understood as: if the main card is not currently on the search network, start the search network; if the main card is already on the search network, do not stop its search network. Because it is necessary to consider that there are three parallel judgment lines in this embodiment that are performing network search scheduling, it is possible that when the card 1 search network is not enabled according to the card 1 network type search network, it has already been opened in other lines. Similarly, When the step of closing the card 1 search network is not reached in the network search according to the card 1 network type, it has already been closed on other lines.
  • the timer 1 is also set to periodically search the network. Specifically, if the network occupancy rate obtained in step 120 in FIG. 1 is lower than the preset network occupancy threshold, that is, for example, in the preparation scenario shown in FIG. 3A (only the card 1 is no network at this time), in the step of FIG. 2 Open the card 1 search network in 204. In this embodiment, after the card 1 is turned on to search the network until a certain period of time, for example, 5s, it returns to step 120 in FIG. 1 to detect the network occupancy rate again. If the network occupancy rate obtained in step 120 in FIG.
  • step 205 in FIG. 2 It is checked whether the preset timer has timed out. If the timer has timed out, the timer is reset in step 206, that is, the timer is cleared, and the card 1 search network is started in step 204. You can still search the web until a specific duration, such as 5s, and then return to step 120 in FIG. If the timer has not timed out, then in step 207 the card 1 search is turned off. For example, it can be turned off until a certain period of time, for example, 5s, and then it returns to step 120 in FIG. Therefore, it is ensured that the network search can still be ensured when the network gap with low network occupancy rate is not found in the target data service on the card 2 to avoid the card 1 being disconnected from the network for a long time and missing important services.
  • FIG. 4 is a detailed description of step 130B in FIG. 1, that is, the network search and scheduling is performed according to the service experience of the target data service on the card 2.
  • step 401 it is determined whether the network occupancy rate obtained in step 120 (step 120 in FIG. 4 is step 120 in FIG. 1) is not lower than the network occupancy threshold, based on which it is determined whether the target data service is actively running status.
  • the target data service is now inactive.
  • the business experience data collected and the judgment based on the business experience data are difficult to represent the user's real experience, that is, it is not suitable to use the line 130B for web search scheduling, then return to step 120, that is, to detect again Network occupancy.
  • the target data service may be searched and scheduled according to the service experience as long as the network occupancy rate is not 0, that is, it is still running, then it may also be determined whether the network occupancy rate is not lower than the network occupancy threshold The step of is omitted, from step 120B directly to the step of determining whether the service experience and link quality meet the threshold.
  • step 402 If the network occupancy rate obtained in step 120 is not lower than the threshold, it is checked in step 402 whether service experience data of the target data service on the card 2 is available in the most recent specific time period.
  • the specific time duration is 1 min
  • the latest specific time duration refers to a retrogression of 1 min from the time of performing the inspection. If the business data is not updated within 1 minute, that is, there is no data packet transmission, it is considered that there is no business experience data that can be used as a basis for subsequent judgment. If service experience data is available, it is checked in step 403A whether the service experience is not lower than the service experience threshold based on the service experience data.
  • step 403B it is checked in step 403B whether the link quality of the card 2 is not lower than the link quality threshold.
  • the service experience can be represented by the parameter RTT.
  • the threshold setting of the RTT depends on the type of target data service. If it is a game service, the threshold can be set to, for example, 150 ms, and the service experience is not lower than the service experience threshold to the service RTT is not higher than 150 ms.
  • Link quality can be represented by different parameters in different networks. RSRP can be used in 4G networks.
  • the link quality meets the threshold.
  • SNR can be used to represent link quality.
  • step 402 In response to the service experience not lower than the service experience threshold, or the link quality not lower than the link quality threshold, return to step 402 to check again whether the service experience data of the target data service on the card 2 is available in the most recent specific time period.
  • the link quality of card 2 is compared with the link quality of card 1.
  • the link quality of the card 1 is data stored in the terminal, and represents the link quality of the card 1 recorded when the card 1 was switched to the card 2 last time. In other embodiments, the link quality of the card 1 may also be the currently measured data, and so on. If the link quality of the card 1 is higher than the link quality of the card 2, then in step 405 it is switched to the card 1 to establish a data path and run data services on the card 1. According to the MPTCP/MPUDP protocol, it allows data services to be smoothly switched between two SIM cards. In some embodiments, before switching back to the card 1, the card 1 may also be searched, and/or the target data service on the card 2 may be deactivated.
  • FIG. 5 is a detailed description of step 130C in FIG. 1.
  • the main card search network is turned on.
  • the user cannot experience the target data service, so searching the network in this scenario will not affect the user experience.
  • searching the Internet in this scenario is not necessary.
  • the card 1 are that the card 1 is the main card or the traffic card, then the card 2 can be switched back under the condition that the card 2 does not run the data service in a way that affects the user experience.
  • the card 1 runs data services in a manner to try whether the card 1 can be used to satisfy the user experience. Taking the Android operating system as an example, you can check whether the data service is in the foreground by calling the foreground.get() function, and the return result is true, which is true, indicating that it is in the foreground, and the return result is false, which is false, indicating that it is in the background.
  • FIG. 6 shows a method for migrating target data services to the card 2 for operation.
  • the white list service refers to a data service that the terminal can approve and is delay-sensitive.
  • the delay-sensitive standard can be customized by the user of the terminal, for example, set in the terminal through a graphical user interface, or can be preset by the terminal at the factory, or can be received from an external source such as a cloud or a server during the operation of the terminal Rules, etc.
  • the white list can be set in the terminal as a configuration file, can also be integrated into a program as code, and so on.
  • step 603 it is checked whether the service experience data of the target data service on the card 1 is available in the latest specific time period.
  • the specific time duration is 1 min
  • the latest specific time duration refers to a retrogression of 1 min from the time of performing the inspection. If the business data is not updated within 1 minute, that is, there is no data packet transmission, it is considered that there is no business experience data that can be used as a basis for subsequent judgment.
  • service experience data it is checked in step 604A whether the service experience is not lower than the service experience threshold based on the service experience data. On the contrary, if no service experience data is available, it is checked in step 604B whether the link quality of the card 1 is not lower than the link quality threshold.
  • the service experience can be represented by the parameter RTT.
  • the threshold setting of the RTT depends on the type of target data service. If it is a game service, the threshold can be set to, for example, 150 ms, and the service experience is not lower than the service experience threshold to the service RTT is not higher than 150 ms.
  • Link quality can be represented by different parameters in different networks. RSRP can be used in 4G networks. In the above step of detecting whether the service experience of the target data service on the card 2 and the link quality of the card 2 meet the threshold, because the judgment of the link quality here is used to subsequently determine whether to cut to the card 2, the link can be The quality threshold is set higher than when judging the link quality in Fig.
  • step 605 it is judged whether it is lower than the aging time.
  • the aging time refers to the time from the last switch from card 1 to card 2 and the time to step 605.
  • the specific value can be set by the terminal or the user. In this embodiment, the aging time is set to 2 min. In other embodiments, the aging time may be other values, such as 1 min. If it is lower than the aging time, return to step 603 to check whether the service experience data of the target data service on the card 1 is available in the latest specific time period. Thereby avoiding frequent switching between the primary card and the secondary card, also known as "anti-ping pong". If it is not lower than the aging time, in step 606, a second data path is established on the card 2. In step 607, the target data service is migrated to the card 2. In step 608, the main card search network is closed.
  • FIG. 7 shows an overview of the network management method provided by an embodiment of the present invention. Its various parts and steps have been described based on Figs. 1-6, which are only briefly described here.
  • Card 1 After the whitelist service reaches the front desk, Card 1 establishes a data path to run the service, which is hereinafter referred to as the target data service. For example, if there is service experience data in the last 1 minute, it is determined whether the service experience meets the threshold, and if there is no service experience data, it is determined whether the link quality meets the threshold. Under the condition that the service experience or link quality meets the threshold, return to detect again whether service experience data is available in the last 1 minute.
  • the service experience or link quality does not meet the threshold, switch to card 2 to establish a data path, and migrate the target service on card 1 to card 2 to continue operation. Close the card 1 search network.
  • the target service on the capture card 2 is, for example, the network occupancy rate of the last 5 seconds.
  • a data service is established on the secondary card of the mobile phone, for example, a Unicom card containing 1G of traffic per month, and the game is smoothly migrated to the secondary card using multi-channel technology.
  • a data service is established on the secondary card of the mobile phone, for example, a Unicom card containing 1G of traffic per month, and the game is smoothly migrated to the secondary card using multi-channel technology.
  • the first way check whether the main card is now in 2G or no network. If it is 2G, check whether the network occupancy rate has reached the threshold. If it is reached, it means that the game is in a fighting state. At this time, the main card search network will negatively affect the game experience of Player 1, such as stutter. Therefore, the network occupancy rate is collected again. On the contrary, if the network occupancy rate does not reach the threshold, it means that the game is preparing for battle. At this time, stealing the time slot and searching the main card for the network will not affect the player 1 experience. If it fails to search, it returns to the step of collecting the network occupancy rate within 5 seconds of the game on the secondary card.
  • the result of the above check is that the main card is in the absence of a network, even if the network occupancy rate of the game on the secondary card reaches the threshold, it is necessary to check whether the preset timer has overflowed. If it overflows, it still needs to search the network for 5s.
  • the third way if the game leaves the front desk, such as switching to the background, closing, or the phone lock screen. You can switch back to the main card if there is a whitelist service to the front desk.
  • the whitelist service can be the same game or other services, such as Taobao.
  • the main card may search the network and/or activate the game on the secondary card, and then wait for the whitelist service to reach the front desk and then switch back to the main card.
  • FIG. 8 shows a schematic structural diagram of an electronic device 800 provided by an embodiment of the present application.
  • the electronic device 800 may include a processor 810, an external memory interface 820, an internal memory 821, a universal serial bus (USB) interface 830, a charging management module 840, a power management module 841, a battery 842, an antenna 1, an antenna 2 , Mobile communication module 850, wireless communication module 860, audio module 870, speaker 870A, receiver 870B, microphone 870C, headphone jack 870D, sensor module 880, buttons 890, motor 891, indicator 892, camera 893, display 894, and Subscriber identification module (SIM) card interface 895, etc.
  • SIM Subscriber identification module
  • the sensor module 880 may include a pressure sensor 880A, a gyro sensor 880B, an air pressure sensor 880C, a magnetic sensor 880D, an acceleration sensor 880E, a distance sensor 880F, a proximity light sensor 880G, a fingerprint sensor 880H, a temperature sensor 880J, a touch sensor 880K, and ambient light Sensor 880L, bone conduction sensor 880M, etc.
  • the structure illustrated in the embodiment of the present invention does not constitute a specific limitation on the electronic device 800.
  • the electronic device 800 may include more or less components than shown, or combine some components, or split some components, or arrange different components.
  • the illustrated components can be implemented in hardware, software, or a combination of software and hardware.
  • the processor 810 may include one or more processing units, for example, the processor 810 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), and an image signal processor (image)signal processor (ISP), controller, memory, video codec, digital signal processor (DSP), baseband processor, and/or neural-network processing unit (NPU) Wait.
  • the different processing units may be independent devices or may be integrated in one or more processors.
  • the controller may be the nerve center and command center of the electronic device 800.
  • the controller can generate the operation control signal according to the instruction operation code and the timing signal to complete the control of instruction fetch and execution.
  • the processor 810 may also be provided with a memory for storing instructions and data.
  • the memory in processor 810 is a cache memory.
  • the memory may store instructions or data that the processor 810 has just used or recycled. If the processor 810 needs to use the instruction or data again, it can be directly called from the memory. Avoid repeated access, reduce the waiting time of the processor 810, thus improving the efficiency of the system.
  • the network management method provided by the embodiment of the present application may be stored as an instruction in a memory, and called and executed by the processor 810 to implement the network management method.
  • the dynamically updated network occupancy parameter used in the search scheduling is detected and transmitted to the processor 810 by the mobile communication module 850.
  • the mobile communication module 850 will be further described below.
  • the processor 810 may include one or more interfaces.
  • Interfaces can include integrated circuit (inter-integrated circuit, I2C) interface, integrated circuit built-in audio (inter-integrated circuit, sound, I2S) interface, pulse code modulation (pulse code modulation (PCM) interface, universal asynchronous transceiver (universal) asynchronous receiver/transmitter, UART) interface, mobile industry processor interface (MIPI), general-purpose input/output (GPIO) interface, subscriber identity module (SIM) interface, and /Or universal serial bus (USB) interface, etc.
  • I2C integrated circuit
  • I2S integrated circuit built-in audio
  • PCM pulse code modulation
  • PCM pulse code modulation
  • UART universal asynchronous transceiver
  • MIPI mobile industry processor interface
  • GPIO general-purpose input/output
  • SIM subscriber identity module
  • USB universal serial bus
  • the I2C interface is a bidirectional synchronous serial bus, including a serial data line (serial data line, SDA) and a serial clock line (derail clock line, SCL).
  • the processor 810 may include multiple sets of I2C buses.
  • the processor 810 can be coupled to the touch sensor 880K, charger, flash, camera 893, etc. through different I2C bus interfaces.
  • the processor 810 may couple the touch sensor 880K through the I2C interface, so that the processor 810 and the touch sensor 880K communicate through the I2C bus interface to realize the touch function of the electronic device 800.
  • the I2S interface can be used for audio communication.
  • the processor 810 may include multiple sets of I2S buses.
  • the processor 810 may be coupled to the audio module 870 through an I2S bus to implement communication between the processor 810 and the audio module 870.
  • the audio module 870 can pass the audio signal to the wireless communication module 860 through the I2S interface to realize the function of answering the call through the Bluetooth headset.
  • the PCM interface can also be used for audio communication, sampling, quantizing and encoding analog signals.
  • the audio module 870 and the wireless communication module 860 may be coupled through a PCM bus interface.
  • the audio module 870 can also transmit audio signals to the wireless communication module 860 through the PCM interface to implement the function of answering the call through the Bluetooth headset. Both the I2S interface and the PCM interface can be used for audio communication.
  • the UART interface is a universal serial data bus used for asynchronous communication.
  • the bus may be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication.
  • a UART interface is generally used to connect the processor 810 and the wireless communication module 860.
  • the processor 810 communicates with the Bluetooth module in the wireless communication module 860 through the UART interface to implement the Bluetooth function.
  • the audio module 870 can transmit audio signals to the wireless communication module 860 through the UART interface to achieve the function of playing music through a Bluetooth headset.
  • the MIPI interface can be used to connect the processor 810 to peripheral devices such as the display screen 894 and the camera 893.
  • MIPI interface includes camera serial interface (camera serial interface, CSI), display serial interface (display serial interface, DSI) and so on.
  • the processor 810 and the camera 893 communicate through a CSI interface to implement the shooting function of the electronic device 800.
  • the processor 810 and the display screen 894 communicate through a DSI interface to realize the display function of the electronic device 800.
  • the GPIO interface can be configured via software.
  • the GPIO interface can be configured as a control signal or as a data signal.
  • the GPIO interface may be used to connect the processor 810 to the camera 893, the display screen 894, the wireless communication module 860, the audio module 870, the sensor module 880, and the like.
  • GPIO interface can also be configured as I2C interface, I2S interface, UART interface, MIPI interface, etc.
  • the USB interface 830 is an interface that conforms to the USB standard specifications, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, etc.
  • the USB interface 830 can be used to connect a charger to charge the electronic device 800, and can also be used to transfer data between the electronic device 800 and peripheral devices. It can also be used to connect headphones and play audio through the headphones.
  • the interface can also be used to connect other electronic devices, such as AR devices.
  • the interface connection relationship between the modules illustrated in the embodiment of the present invention is only a schematic description, and does not constitute a limitation on the structure of the electronic device 800.
  • the electronic device 800 may also use different interface connection methods in the foregoing embodiments, or a combination of multiple interface connection methods.
  • the charging management module 840 is used to receive charging input from the charger.
  • the charger can be a wireless charger or a wired charger.
  • the charging management module 840 may receive the charging input of the wired charger through the USB interface 830.
  • the charging management module 840 may receive wireless charging input through the wireless charging coil of the electronic device 800. While the charging management module 840 charges the battery 842, it can also supply power to the electronic device through the power management module 841.
  • the power management module 841 is used to connect the battery 842, the charging management module 840 and the processor 810.
  • the power management module 841 receives input from the battery 842 and/or the charging management module 840, and supplies power to the processor 810, internal memory 821, external memory, display screen 894, camera 893, and wireless communication module 860.
  • the power management module 841 can also be used to monitor battery capacity, battery cycle times, battery health status (leakage, impedance) and other parameters.
  • the power management module 841 may also be disposed in the processor 810.
  • the power management module 841 and the charging management module 840 may also be set in the same device.
  • the wireless communication function of the electronic device 800 can be realized by the antenna 1, the antenna 2, the mobile communication module 850, the wireless communication module 860, the modem processor, and the baseband processor.
  • Antenna 1 and antenna 2 are used to transmit and receive electromagnetic wave signals.
  • Each antenna in the electronic device 800 may be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization.
  • the antenna 1 can be multiplexed as a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
  • the mobile communication module 850 may provide a wireless communication solution including 2G/3G/4G/5G and the like applied to the electronic device 800.
  • the mobile communication module 850 may include at least one filter, switch, power amplifier, low noise amplifier (LNA), and so on.
  • the mobile communication module 850 can receive electromagnetic waves from the antenna 1 and filter, amplify, etc. the received electromagnetic waves, and transmit them to the modem processor for demodulation.
  • the mobile communication module 850 can also amplify the signal modulated by the modulation and demodulation processor and convert it to electromagnetic wave radiation through the antenna 1.
  • the mobile communication module 850 includes a transceiver device for collecting the network occupancy rate of data services running on the SIM card on the electronic device 800.
  • the transceiver device includes an antenna 1, an IC chip, and a driver for controlling the operation of the antenna 1 and the IC chip, and the driver is implemented as software.
  • at least part of the functional modules of the mobile communication module 850 may be provided in the processor 810.
  • at least part of the functional modules of the mobile communication module 850 and at least part of the modules of the processor 810 may be provided in the same device.
  • the modem processor may include a modulator and a demodulator.
  • the modulator is used to modulate the low-frequency baseband signal to be transmitted into a high-frequency signal.
  • the demodulator is used to demodulate the received electromagnetic wave signal into a low-frequency baseband signal.
  • the demodulator then transmits the demodulated low-frequency baseband signal to the baseband processor for processing.
  • the low-frequency baseband signal is processed by the baseband processor and then passed to the application processor.
  • the application processor outputs an audio signal through an audio device (not limited to a speaker 870A, a receiver 870B, etc.), or displays an image or video through a display screen 894.
  • the modem processor may be an independent device.
  • the modem processor may be independent of the processor 810, and may be set in the same device as the mobile communication module 850 or other functional modules.
  • the wireless communication module 860 can provide wireless local area networks (wireless local area networks, WLAN) (such as wireless fidelity (Wi-Fi) networks), Bluetooth (bluetooth, BT), and global navigation satellites that are applied to the electronic device 800. Wireless communication solutions such as global navigation (satellite system, GNSS), frequency modulation (FM), near field communication (NFC), infrared technology (infrared, IR), etc.
  • the wireless communication module 860 may be one or more devices integrating at least one communication processing module.
  • the wireless communication module 860 receives electromagnetic waves via the antenna 2, modulates and filters electromagnetic wave signals, and transmits the processed signals to the processor 810.
  • the wireless communication module 860 may also receive the signal to be transmitted from the processor 810, frequency-modulate it, amplify it, and convert it to electromagnetic waves through the antenna 2 to radiate it out.
  • the antenna 1 of the electronic device 800 is coupled to the mobile communication module 850, and the antenna 2 is coupled to the wireless communication module 860 so that the electronic device 800 can communicate with the network and other devices through wireless communication technology.
  • the wireless communication technology may include a global mobile communication system (global system for mobile communications, GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), broadband Wideband code division multiple access (WCDMA), time-division code division multiple access (TD-SCDMA), long-term evolution (LTE), BT, GNSS, WLAN, NFC , FM, and/or IR technology, etc.
  • the GNSS may include a global positioning system (GPS), a global navigation satellite system (GLONASS), a beidou navigation system (BDS), and a quasi-zenith satellite system (quasi -zenith satellite system (QZSS) and/or satellite-based augmentation system (SBAS).
  • GPS global positioning system
  • GLONASS global navigation satellite system
  • BDS beidou navigation system
  • QZSS quasi-zenith satellite system
  • SBAS satellite-based augmentation system
  • the electronic device 800 realizes a display function through a GPU, a display screen 894, and an application processor.
  • the GPU is a microprocessor for image processing, connecting the display 894 and the application processor.
  • the GPU is used to perform mathematical and geometric calculations, and is used for graphics rendering.
  • the processor 810 may include one or more GPUs that execute program instructions to generate or change display information.
  • the display 894 is used to display images, videos, etc.
  • the display screen 894 includes a display panel.
  • the display panel can use a liquid crystal display (LCD), organic light-emitting diode (OLED), active matrix organic light-emitting diode or active matrix organic light-emitting diode (active-matrix organic light-emitting diode) emitting diode, AMOLED, flexible light-emitting diode (FLED), Miniled, MicroLed, Micro-oLed, quantum dot light emitting diode (QLED), etc.
  • the electronic device 800 may include 1 or N display screens 894, where N is a positive integer greater than 1.
  • the electronic device 800 can realize a shooting function through an ISP, a camera 893, a video codec, a GPU, a display 894, an application processor, and the like.
  • the ISP is used to process the data returned by the camera 893. For example, when taking a picture, the shutter is opened, and light is transmitted to the photosensitive element of the camera through the lens, and the optical signal is converted into an electrical signal. The photosensitive element of the camera transmits the electrical signal to the ISP for processing and converts it into an image visible to the naked eye. ISP can also optimize the algorithm of image noise, brightness and skin color. ISP can also optimize the exposure, color temperature and other parameters of the shooting scene. In some embodiments, the ISP may be provided in the camera 893.
  • the camera 893 is used to capture still images or videos.
  • the object generates an optical image through the lens and projects it onto the photosensitive element.
  • the photosensitive element may be a charge coupled device (charge coupled device, CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
  • CCD charge coupled device
  • CMOS complementary metal-oxide-semiconductor
  • the photosensitive element converts the optical signal into an electrical signal, and then transmits the electrical signal to the ISP to convert it into a digital image signal.
  • the ISP outputs the digital image signal to the DSP for processing.
  • DSP converts digital image signals into standard RGB, YUV and other format image signals.
  • the electronic device 800 may include 1 or N cameras 893, where N is a positive integer greater than 1.
  • the digital signal processor is used to process digital signals. In addition to digital image signals, it can also process other digital signals. For example, when the electronic device 800 is selected at a frequency point, the digital signal processor is used to perform Fourier transform on the energy at the frequency point.
  • the video codec is used to compress or decompress digital video.
  • the electronic device 800 may support one or more video codecs. In this way, the electronic device 800 can play or record videos in various encoding formats, such as: moving picture experts group (MPEG) 1, MPEG2, MPEG3, MPEG4, and so on.
  • MPEG moving picture experts group
  • NPU is a neural-network (NN) computing processor.
  • NN neural-network
  • the NPU can realize applications such as intelligent recognition of the electronic device 800, such as image recognition, face recognition, voice recognition, and text understanding.
  • the external memory interface 820 may be used to connect an external memory card, such as a Micro SD card, to expand the storage capacity of the electronic device 800.
  • the external memory card communicates with the processor 810 through the external memory interface 820 to realize the data storage function. For example, save music, video and other files in an external memory card.
  • the internal memory 821 may be used to store computer executable program code, where the executable program code includes instructions.
  • the processor 810 executes instructions stored in the internal memory 821 to execute various functional applications of the electronic device 800 and data processing.
  • the internal memory 821 may include a storage program area and a storage data area.
  • the storage program area may store an operating system, at least one function required application programs (such as sound playback function, image playback function, etc.).
  • the storage data area may store data (such as audio data, phone book, etc.) created during the use of the electronic device 800 and the like.
  • the internal memory 821 may include a high-speed random access memory, and may also include a nonvolatile memory, such as at least one disk storage device, a flash memory device, a universal flash memory (universal flash storage, UFS), and so on.
  • a nonvolatile memory such as at least one disk storage device, a flash memory device, a universal flash memory (universal flash storage, UFS), and so on.
  • the electronic device 800 may implement audio functions through an audio module 870, a speaker 870A, a receiver 870B, a microphone 870C, a headphone jack 870D, and an application processor. For example, music playback, recording, etc.
  • the audio module 870 is used to convert digital audio information into analog audio signal output, and also used to convert analog audio input into digital audio signal.
  • the audio module 870 may also be used to encode and decode audio signals.
  • the audio module 870 may be disposed in the processor 810, or a part of the functional modules of the audio module 870 may be disposed in the processor 810.
  • the speaker 870A also called “speaker” is used to convert audio electrical signals into sound signals.
  • the electronic device 800 can listen to music through the speaker 870A, or listen to a hands-free call.
  • the receiver 870B also known as "handset" is used to convert audio electrical signals into sound signals.
  • the electronic device 800 answers a call or a voice message, it can answer the voice by bringing the receiver 870B close to the ear.
  • Microphone 870C also known as “microphone”, “microphone”, is used to convert sound signals into electrical signals. When making a call or sending a voice message, the user can make a sound by approaching the microphone 870C through the human mouth, and input the sound signal to the microphone 870C.
  • the electronic device 800 may be provided with at least one microphone 870C. In other embodiments, the electronic device 800 may be provided with two microphones 870C. In addition to collecting sound signals, it may also achieve a noise reduction function. In other embodiments, the electronic device 800 may also be provided with three, four or more microphones 870C to collect sound signals, reduce noise, identify sound sources, and implement directional recording functions.
  • the headphone jack 870D is used to connect wired headphones.
  • the headphone jack 870D may be a USB jack 830, or a 3.5mm open mobile electronic device (open mobile terminal) platform (OMTP) standard interface, and the American Telecommunications Industry Association (cellular telecommunications industry association of the United States, CTIA) standard interface.
  • OMTP open mobile electronic device
  • CTIA American Telecommunications Industry Association
  • the pressure sensor 880A is used to sense the pressure signal and can convert the pressure signal into an electrical signal.
  • the pressure sensor 880A may be provided on the display screen 894. Pressure sensor 880A
  • the capacitive pressure sensor may be a parallel plate including at least two conductive materials.
  • the electronic device 800 determines the intensity of the pressure according to the change in capacitance.
  • the electronic device 800 detects the intensity of the touch operation according to the pressure sensor 880A.
  • the electronic device 800 may also calculate the touched position according to the detection signal of the pressure sensor 880A.
  • touch operations that act on the same touch position but have different touch operation intensities may correspond to different operation instructions.
  • the gyro sensor 880B may be used to determine the movement posture of the electronic device 800.
  • the angular velocity of the electronic device 800 about three axes ie, x, y, and z axes
  • the gyro sensor 880B can be used to shoot anti-shake.
  • the gyro sensor 880B detects the shaking angle of the electronic device 800, calculates the distance that the lens module needs to compensate based on the angle, and allows the lens to cancel the shaking of the electronic device 800 through reverse movement to achieve anti-shake.
  • the gyro sensor 880B can also be used for navigation and somatosensory game scenes.
  • Air pressure sensor 880C is used to measure air pressure. In some embodiments, the electronic device 800 calculates the altitude through the air pressure value measured by the air pressure sensor 880C to assist positioning and navigation.
  • the magnetic sensor 880D includes a Hall sensor.
  • the electronic device 800 may use the magnetic sensor 880D to detect the opening and closing of the flip holster.
  • the electronic device 800 may detect the opening and closing of the clamshell according to the magnetic sensor 880D.
  • characteristics such as automatic unlocking of the flip cover are set.
  • the acceleration sensor 880E can detect the magnitude of acceleration of the electronic device 800 in various directions (generally three axes). When the electronic device 800 is stationary, the magnitude and direction of gravity can be detected. It can also be used to recognize the posture of electronic devices, and can be used in horizontal and vertical screen switching, pedometer and other applications.
  • the distance sensor 880F is used to measure the distance.
  • the electronic device 800 can measure the distance by infrared or laser. In some embodiments, when shooting scenes, the electronic device 800 may use the distance sensor 880F to measure distance to achieve fast focusing.
  • the proximity light sensor 880G may include, for example, a light emitting diode (LED) and a light detector, such as a photodiode.
  • the light emitting diode may be an infrared light emitting diode.
  • the electronic device 800 emits infrared light outward through the light emitting diode.
  • the electronic device 800 uses a photodiode to detect infrared reflected light from nearby objects. When sufficient reflected light is detected, it may be determined that there is an object near the electronic device 800. When insufficient reflected light is detected, the electronic device 800 may determine that there is no object near the electronic device 800.
  • the electronic device 800 can use the proximity light sensor 880G to detect that the user holds the electronic device 800 close to the ear to talk, so as to automatically turn off the screen to save power.
  • Proximity light sensor 880G can also be used in leather case mode, pocket mode automatically unlocks and locks the screen.
  • the ambient light sensor 880L is used to sense the ambient light brightness.
  • the electronic device 800 can adaptively adjust the brightness of the display screen 894 according to the perceived ambient light brightness.
  • the ambient light sensor 880L can also be used to automatically adjust the white balance when taking pictures.
  • the ambient light sensor 880L can also cooperate with the proximity light sensor 880G to detect whether the electronic device 800 is in a pocket to prevent accidental touch.
  • the fingerprint sensor 880H is used to collect fingerprints.
  • the electronic device 800 may use the collected fingerprint characteristics to unlock the fingerprint, access the application lock, take a photo of the fingerprint, and answer the call with the fingerprint.
  • the temperature sensor 880J is used to detect the temperature.
  • the electronic device 800 uses the temperature detected by the temperature sensor 880J to execute a temperature processing strategy. For example, when the temperature reported by the temperature sensor 880J exceeds the threshold, the electronic device 800 performs to reduce the performance of the processor located near the temperature sensor 880J in order to reduce power consumption and implement thermal protection.
  • the electronic device 800 heats the battery 842 to avoid the abnormal shutdown of the electronic device 800 due to the low temperature.
  • the electronic device 800 when the temperature is below another threshold, the electronic device 800 performs boosting on the output voltage of the battery 842 to avoid abnormal shutdown due to low temperature.
  • Touch sensor 880K also known as "touch panel”.
  • the touch sensor 880K may be provided on the display screen 894, and the touch sensor 880K and the display screen 894 constitute a touch screen, also called a "touch screen”.
  • the touch sensor 880K is used to detect a touch operation acting on or near it.
  • the touch sensor can pass the detected touch operation to the application processor to determine the type of touch event.
  • the visual output related to the touch operation may be provided through the display screen 894.
  • the touch sensor 880K may also be disposed on the surface of the electronic device 800, which is different from the location where the display screen 894 is located.
  • the bone conduction sensor 880M can acquire vibration signals.
  • the bone conduction sensor 880M can acquire the vibration signal of the vibrating bone mass of the human voice.
  • the bone conduction sensor 880M can also contact the pulse of the human body and receive the blood pressure beating signal.
  • the bone conduction sensor 880M may also be provided in the earphone and combined into a bone conduction earphone.
  • the audio module 870 can parse out the voice signal based on the vibration signal of the vibrating bone block of the voice part acquired by the bone conduction sensor 880M to realize the voice function.
  • the application processor may parse heart rate information based on the blood pressure beating signal acquired by the bone conduction sensor 880M to implement the heart rate detection function.
  • the key 890 includes a power-on key, a volume key, and the like.
  • the key 890 may be a mechanical key. It can also be a touch button.
  • the electronic device 800 can receive key input and generate key signal input related to user settings and function control of the electronic device 800.
  • the motor 891 can generate a vibration prompt.
  • the motor 891 can be used for vibration notification of incoming calls and can also be used for touch vibration feedback.
  • touch operations applied to different applications may correspond to different vibration feedback effects.
  • the motor 891 can also correspond to different vibration feedback effects.
  • Different application scenarios for example: time reminder, receiving information, alarm clock, game, etc.
  • Touch vibration feedback effect can also support customization.
  • the indicator 892 can be an indicator light, which can be used to indicate the charging state, the amount of power change, and can also be used to indicate messages, missed calls, notifications, and the like.
  • the SIM card interface 895 is used to connect a SIM card.
  • the SIM card can be inserted into or removed from the SIM card interface 895 to achieve contact and separation with the electronic device 800.
  • the electronic device 800 may support 1 or N SIM card interfaces, where N is a positive integer greater than 1.
  • the SIM card interface 895 can support Nano SIM cards, Micro SIM cards, SIM cards, etc.
  • the same SIM card interface 895 can insert multiple cards at the same time. The types of the multiple cards may be the same or different.
  • the SIM card interface 895 can also be compatible with different types of SIM cards.
  • the SIM card interface 895 is also compatible with external memory cards.
  • the electronic device 800 interacts with the network through the SIM card to realize functions such as call and data communication.
  • the electronic device 800 uses eSIM, that is, an embedded SIM card.
  • the eSIM card can be embedded in the electronic device 800, and cannot be separated from the electronic device 800.
  • FIG. 9 is a block diagram of a software structure of an electronic device 800 according to an embodiment of the present invention.
  • the layered architecture divides the software into several layers, and each layer has a clear role and division of labor.
  • the layers communicate with each other through a software interface.
  • the Android system is divided into four layers, from top to bottom are the application layer, the application framework layer, the Android runtime and the system library, and the kernel layer.
  • the application layer may include a series of application packages.
  • the application package may include applications such as camera, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, and short message.
  • the application framework layer provides an application programming interface (application programming interface) and programming framework for applications at the application layer.
  • the application framework layer includes some predefined functions.
  • the application framework layer may include a window manager, a content provider, a view system, a phone manager, a resource manager, a notification manager, and so on.
  • the window manager is used to manage window programs.
  • the window manager can obtain the size of the display screen, determine whether there is a status bar, lock the screen, intercept the screen, etc.
  • Content providers are used to store and retrieve data, and make these data accessible to applications.
  • the data may include videos, images, audio, calls made and received, browsing history and bookmarks, phonebooks, etc.
  • the view system includes visual controls, such as controls for displaying text and controls for displaying pictures.
  • the view system can be used to build applications.
  • the display interface can be composed of one or more views.
  • a display interface including an SMS notification icon may include a view to display text and a view to display pictures.
  • the phone manager is used to provide the communication function of the electronic device 800. For example, the management of the call status (including connection, hang up, etc.).
  • the resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, and so on.
  • the notification manager enables applications to display notification information in the status bar, which can be used to convey notification-type messages, and can disappear automatically after a short stay without user interaction.
  • the notification manager is used to notify the completion of downloading, message reminders, etc.
  • the notification manager can also be a notification that appears in the status bar at the top of the system in the form of a chart or scroll bar text, such as a notification of an application running in the background, or a notification that appears on the screen in the form of a dialog window.
  • the text message is displayed in the status bar, a prompt sound is emitted, the electronic device vibrates, and the indicator light flashes.
  • Android Runtime includes core library and virtual machine. Android runtime is responsible for the scheduling and management of the Android system.
  • the core library contains two parts: one part is the function function that Java language needs to call, and the other part is the core library of Android.
  • the application layer and the application framework layer run in the virtual machine.
  • the virtual machine executes the java files of the application layer and the application framework layer into binary files.
  • the virtual machine is used to perform functions such as object lifecycle management, stack management, thread management, security and exception management, and garbage collection.
  • the system library may include multiple functional modules. For example: surface manager (surface manager), media library (Media library), 3D graphics processing library (for example: OpenGL ES), 2D graphics engine (for example: SGL), etc.
  • surface manager surface manager
  • media library Media library
  • 3D graphics processing library for example: OpenGL ES
  • 2D graphics engine for example: SGL
  • the surface manager is used to manage the display subsystem and provides the fusion of 2D and 3D layers for multiple applications.
  • the media library supports a variety of commonly used audio, video format playback and recording, and still image files.
  • the media library can support multiple audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
  • the 3D graphics processing library is used to realize 3D graphics drawing, image rendering, synthesis, and layer processing.
  • the 2D graphics engine is a drawing engine for 2D drawing.
  • the kernel layer is the layer between hardware and software.
  • the kernel layer contains at least the display driver, camera driver, audio driver, and sensor driver.
  • the network management method provided by the embodiment of the present application may be implemented as a search engine for the network scheduling in the kernel layer, a function for the network searching library in the system library, or a network searching interface in the application framework layer.
  • the network management method can also be cured into the network card chip, for example, by firing into the modem layer.
  • An embodiment of the present application further provides a computer storage medium, including computer instructions, which, when the computer instructions run on the terminal, cause the terminal to perform the network management method in any possible implementation manner of the first aspect.
  • An embodiment of the present application further provides a computer program product, which, when the computer program product runs on the terminal, causes the terminal to perform the network management method in any possible implementation manner of the first aspect.
  • the basic idea of the embodiment of the present application is that when the data service is switched to the secondary card due to poor primary card experience, and the primary card drops 2G/3G or no network, the primary card search network is not started immediately, but according to the user's current Business flow characteristics and user scenarios dynamically control web search timing. On the one hand, searching the network as soon as possible will restore the called calling capability of the user's main card as soon as possible. On the other hand, frequent and continuous searching the network will interrupt the business traffic and cause interruption of experience. Therefore, the core technical problem to be solved by the present invention is how to describe the characteristics of service traffic and user scenarios, search the network when the conditions are met, and stop the network search when the conditions are not met, so as to reach a trade-off between user experience and network search as soon as possible.
  • Case 1 The primary card failed to successfully connect to the network of operator A for 1 minute of continuous web search, but the secondary card was unable to send data services due to the web search process. In this case, the user could not go online at all times;
  • Case 2 System detection When the user is intensively using data services (sending WeChat information) at this time, the web search is temporarily stopped, and then after the WeChat is sent, the user locks the screen, and the web search is started at this time. The user experience is smooth throughout the network.
  • the computer program product may include one or more computer instructions.
  • the computer may be a general-purpose computer, a dedicated computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be from a website site, computer, server or data center Transmission to another website, computer, server or data center via wired (such as coaxial cable, optical fiber, digital subscriber (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device including a server, a data center, and the like integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic disk), an optical medium (for example, a DVD), or a semiconductor medium (for example, Solid State Disk (SSD)) or the like.
  • a magnetic medium for example, a floppy disk, a hard disk, a magnetic disk
  • an optical medium for example, a DVD
  • a semiconductor medium for example, Solid State Disk (SSD)
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical, or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium.
  • the technical solution of the present application essentially or part of the contribution to the existing technology or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to enable a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application.
  • the foregoing storage media include various media that can store program codes, such as a U disk, a mobile hard disk, a read-only memory, a random access memory, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

提供了一种用于终端的网络管理方法,该终端具有至少两个用户识别模块,包括第一用户识别模块和第二用户识别模块,该网络管理方法包括:使终端在第二用户识别模块上运行第一数据业务,检测第一数据业务的网络占用率,基于该网络占用率确定第一用户识别模块的搜网方式。

Description

面向多卡的网络管理 技术领域
本申请涉及通信领域,尤其涉及一种用于终端的网络管理方法和对应的终端。
背景技术
在目前的移动通信领域,出于对业务、流量、资费、个人需要等因素的考虑,越来越多终端支持插入和运行多张移动通信运营商的数据卡,通常为SIM卡。例如,两张数据卡隶属不同的运营商,一张卡是中国移动,另一张卡是中国联通。不同电信运营商的蜂窝网络覆盖存在一定的互补性,例如用户在高铁、地铁场景,中国移动的4G信号质量较差时,可能中国联通的4G信号质量较好。因此,如果能根据网络质量动态选择最佳的移动运营商网络接入,形成互补,就可以提高用户的通信体验。
随着通信协议的发展,多路传输控制协议(multipath transmission control protocol,MPTCP)/多路用户数据报协议(multipath user datagram protocal,MPUDP)协议允许UE(user equipment,用户设备)在两个不同的网络上平滑切换,保证了业务体验的连续。
在当前终端中,其通常设置了双卡双待(dual sim dual standby,DSDS)和双卡双通(dual sim dual active,DSDA),当一张卡(称为卡1)处于2G/3G或者无网时,此时即便使用MP(multipath,多路)能力将数据业务切换到另一张卡(称为卡2),卡1的搜网(LTE Cell Search)也会严重影响卡2的数据业务能力,表现为时延增大、并发数据量进一步降低、随时间进一步恶化。卡2的数据业务体验代表了当前用户的体验,其应该被保护,而如果卡1是用户根据流量因素设置的主卡,则卡1数据业务恢复的及时性又关系到使用成本和未来的用户体验。
发明内容
本申请实施例提供一种面向终端的网络管理机制,例如一种搜网调度方法,在保障当前用户数据业务体验的条件下,兼顾流量成本和未来的用户体验。“多卡”指的是多个用户识别模块,它们既可以是物理上分离的多张卡,也可以是例如一张数字用户识别卡(eSIM)上划分出的多个虚拟卡。
为了达到上述目的,本申请实施例采用如下技术方案:
第一方面,提供一种用于终端的网络管理方法,例如一种搜网调度方法,该终端具有至少两个用户识别模块,包括第一用户识别模块和第二用户识别模块,该网络管理方法包括:使终端在第二用户识别模块上运行第一数据业务,检测第一数据业务的网络占用率,基于该网络占用率确定第一用户识别模块的搜网方式。网络占用率包括例如网络使用频率和/或吞吐量。第一数据业务指的例如是包含在终端中设置的白名单中的业务。该白名单业务指的是该终端可以批准运行且时延敏感类的数据业务。时延敏感的标准可以是终端的用户自定义的,例如通过图形用户界面设置到终端中,也可以是终端出厂时预设的,也可以是在终端运行过程中从外部例如云端、服务器接收的规则,等等。该白名单可以作为配置文件设置在终端中,也可以作为代码集成到一段程序中,等等。应理解的是,搜网方式 并不意味着一定要执行搜网。可以根据场景需要而决定不搜网。检测第一数据业务的网络占用率的方式例如可以是根据第一数据业务特定时长里的网络占用率然后算出平均值。该特定时长例如是5s。
在一些可能的实现方式中,检测第一用户识别模块所处的网络类型,响应于检测结果,在网络类型是无网络的条件下,采用第一搜网方式对第一网络进行搜网,在网络类型是不同于第一网络的第二网络的条件下,采用第二搜网方式对第一网络进行搜网,该第二搜网方式不同于第一搜网方式。
在一些可能的实现方式中,第一网络是LTE网络或者比LTE更晚出现的通信网络,例如5G网络。
在一些可能的实现方式中,第二网络是2G网络。
在一些可能的实现方式中,第一搜网方式包括:在网络占用率低于网络占用率阈值的条件下,开启第一用户识别模块对第一网络的搜网。在一些可能的实现方式中,搜网直至第一时长,然后回到检测第一数据业务的网络占用率的步骤。第一时长例如为5s。
在一些可能的实现方式中,第一搜网方式包括:在网络占用率不低于网络占用率阈值的条件下,检查预设计时器是否超时,在计时器未超时的条件下,关闭第一用户识别模块对第一网络的搜网。在一些可能的实现方式中,在计时器超时的条件下,重置计时器并且开启第一用户识别模块对第一网络的搜网。在一些可能的实现方式中,关闭搜网直至第二时长,回到检测第一数据业务的网络占用率的步骤。第二时长例如是5s。在一些可能的实现方式中,搜网直至第一时长,回到检测第一数据业务的网络占用率的步骤。第一时长例如是5s。重置计时器指的是将计时器置零。对于“关闭第一用户识别模块对第一网络的搜网”,在此应理解为包含:第一用户识别模块当前在搜网,就将搜网停止;以及,第一用户识别模块当前未在搜网,就不开启搜网。对于开启搜网应理解为包含:第一用户识别模块当前在搜网,就不停止该搜网;以及,第一用户识别模块当前不在搜网,则启动其搜网。
在一些可能的实现方式中,第二搜网方式包括:在网络占用率低于网络占用率阈值的条件下,开启第一用户识别模块对第一网络的搜网。在一些可能的实现方式中,搜网直至第三时长,回到检测第一数据业务的网络占用率的步骤。第三时长例如是5s。
在一些可能的实现方式中,第二搜网方式包括:在网络占用率不低于网络占用率阈值的条件下,关闭第一用户识别模块对第一网络的搜网。在一些可能的实现方式中,关闭搜网直至第四时长,回到检测第一数据业务的网络占用率的步骤。第四时长例如是5s。
在一些可能的实现方式中,网络管理方法还包括:判断第一数据业务是否关闭或切换到后台,响应于第一数据业务关闭或来切换到后台,或者终端锁屏,开启第一用户识别模块对第一网络的搜网。在一些可能的实现方式中,响应于第一数据业务关闭或切换到后台,或者终端锁屏,去激活第二用户识别模块上运行的第一数据业务。在一些可能的实现方式中,在第一数据业务关闭或来切换到后台后,响应于第二数据业务被设置到前台,在第一用户识别模块上建立第一数据通路以运行该切换到前台的第一数据业务。应理解的是该被设置到前台的第二数据业务与被关闭或切换到后台的第一数据业务可以相同也可以不同。第一数据业务和第二数据业务指的例如是包含在终端中设置的白名单中的业务。该白名单业务指的是该终端可以批准运行且时延敏感类的数据业务。时延敏感的标准可以是终端的用户自定义的,例如通过图形用户界面设置到终端中,也可以是终端出厂时预设的,也可以是在终端运行过程中从外部例如云端、服务器接收的规则,等等,本申请对设置方式不 做限定。该白名单可以作为配置文件设置在终端中,也可以作为代码集成到一段程序中,本申请对白名单的存储和实施方式不做限定。在第一数据业务关闭或切换到后台或者终端锁屏后,可以开启第一用户识别模块的搜网和/或去激活第二用户识别模块的第一数据业务,然后等到第二数据业务被设置到前台,在第一用户识别模块建立第一数据通路。也可以在第一数据业务关闭或切换到后台或者终端锁屏后,不做第一用户识别模块的搜网也不去激活第二用户识别模块的第一数据业务,仍然等到第二数据业务被设置到前台,在第一用户识别模块建立第一数据通路。换言之,在第一数据业务关闭或切换到后台或者终端锁屏后,已经没有重要业务在当前需要网络,所以可以不搜网就利用空挡切换到第一用户识别模块上试一试业务体验和链路质量是不是能够满足预设阈值。另外,在第一数据业务关闭或切到后台或者终端锁屏的条件下,在该第二用户识别模块上去激活该第一数据业务也不是必要的,MPTCP/MPUDP协议允许终端在两个不同网络上平滑切换,因此通过在第一用户识别模块上建立第一数据通路可以将第一数据业务平滑转移到第一用户识别模块上,从而当第一数据业务被切回前台或重新激活时从用户体验角度来讲还是平滑连续地运行的。
在一些可能的实现方式中,网络管理方法还包括:检查是否有最近第五时长内更新的第一数据业务的业务体验数据可用。第五时长例如是1min,则最近第五时长指的是从做该检查的时刻起倒推1min。在一些可能的实现方式中,在检查是否有最近第五时长内更新的业务体验数据可用前先判断网络占用率是否低于网络占用率阈值,在网络占用率是不低于网络占用率阈值的条件下检查是否有最近第五时长内更新的业务体验数据可用。在一些可能的实现方式中,网络占用率不低于网络占用率阈值指的是网络使用频率不低于网络使用频率阈值并且吞吐量不低于吞吐量阈值。
在一些可能的实现方式中,响应于有最近第五时长内更新的第一数据业务的业务体验数据可用,基于该业务体验数据检查业务体验是否不低于第一业务体验阈值。“业务体验不低于第一业务体验阈值”指的是业务体验要和第一业务体验阈值一样好或者更好。在用往返时延代表业务体验时,满足业务体验阈值指的是该业务的往返时延不高于预设的往返时延阈值。在一些可能的实现方式中,响应于无最近第五时长内更新的第一数据业务的业务体验数据可用,检查第二用户识别模块的链路质量是否不低于第一链路质量阈值。
在一些可能的实现方式中,响应于业务体验不低于第一业务体验阈值,回到检查是否有最近第五时长内更新的第一数据业务的业务体验数据可用的步骤。在一些可能的实现方式中,响应于链路质量不低于第一链路质量阈值,回到检查是否有最近第五时长内更新的第一数据业务的业务体验数据可用的步骤。
在一些可能的实现方式中,响应于业务体验低于第一业务体验阈值,或者响应于链路质量低于第一链路质量阈值,将第二用户识别模块的链路质量与第一用户识别模块的链路质量相比较,响应于第一用户识别模块的链路质量在第二用户识别模块的链路质量以下,返回检测第二用户识别模块的业务体验和链路质量的步骤。在一些可能的实现方式中,第一用户识别模块的链路质量是存储在终端中的,例如是切换到第二用户识别模块之前最后记录的第一用户识别模块的链路质量。“业务体验低于第一业务体验阈值”指的是业务体验比第一业务体验阈值差。在用往返时延代表业务体验时,满足业务体验阈值指的是该业务的往返时延高于预设的往返时延阈值。
在一些可能的实现方式中,响应于第一用户识别模块的链路质量高于第二用户识别模 块的链路质量,开启第一用户识别模块对第一网络的搜网。在一些可能的实现方式中,响应于第一用户识别模块的链路质量高于第二用户识别模块的链路质量,去激活第二用户识别模块上运行的第一数据业务。在一些可能的实现方式中,响应于第一用户识别模块的链路质量高于第二用户识别模块的链路质量,在第一用户识别模块上建立第一数据通路并且将第一数据业务转移到第一用户识别模块上。在一些可能的实现方式中,第一用户识别模块的链路质量是存储在终端中的,例如是切换到第二用户识别模块之前最后记录的第一用户识别模块的链路质量。在第一用户识别模块的链路质量高于第二用户识别模块的链路质量的条件下,可以开启第一用户识别模块的搜网和/或在第二用户识别模块上去激活第一数据业务,然后切换到第一用户识别模块建立第一数据通路。也可以不做第一用户识别模块的搜网,也不在第二用户识别模块上去激活第一数据业务,直接切到第一用户识别模块。因为此时第二用户识别模块的用户体验已然不满足阈值,第一用户识别模块在切到第二用户识别模块之前的链路质量又更高,所以即使先不对第一用户识别模块进行搜网,也可以切回第一用户识别模块尝试一下体验会不会优于第二用户识别模块。而由于MPTCP/MPUDP协议允许平滑切换网络,即使先不在第二用户识别模块上去激活第一数据业务,也预期该第一数据业务可以平滑切换到第一用户识别模块上而不会出现错乱。
在一些可能的实现方式中,网络管理方法还包括:响应于第一数据业务被设置到前台,在第一用户识别模块上建立第一数据通路以运行第一数据业务,检查是否有最近第六时长内更新的第一数据业务的业务体验数据可用。第六时长例如是1min,则最近第六时长指的是从做该检查的时刻起倒推1min。
在一些可能的实现方式中,响应于有最近第六时长内更新的第一数据业务的业务体验数据可用,基于该业务体验数据检查业务体验是否不低于第二业务体验阈值。“业务体验不低于第二业务体验阈值”指的是业务体验要和第二业务体验阈值一样好或者更好。在用往返时延代表业务体验时,满足业务体验阈值指的是该业务的往返时延不高于预设的往返时延阈值。在一些可能的实现方式中,响应于无最近第六时长内更新的第一数据业务的业务体验数据可用,检查第二用户识别模块的链路质量是否不低于第二链路质量阈值。
在一些可能的实现方式中,响应于业务体验不低于第二业务体验阈值,回到检查是否有最近第六时长内更新的第一数据业务的业务体验数据可用的步骤。在一些可能的实现方式中,响应于链路质量不低于第二链路质量阈值,回到检查是否有最近第六时长内更新的第一数据业务的业务体验数据可用的步骤。
在一些可能的实现方式中,响应于业务体验低于第二业务体验阈值,或者响应于链路质量低于第二链路质量阈值,在第二用户识别模块上建立第二数据通路,将该第一数据业务迁移到第二用户识别模块上。在一些可能的实现方式中,还关闭第一用户识别模块的搜网。在一些可能的实现方式中,响应于业务体验低于第二业务体验阈值,或者响应于链路质量低于第二链路质量阈值,还判断是否不低于老化时间,在不低于老化时间的条件下才在第二用户识别模块上建立第二数据通路,将该第一数据业务迁移到第二用户识别模块上。老化时间物理含义是上次从第一用户识别模块切换到第二用户识别模块的时间算起到此次判断老化时间这一时刻的时间,具体数值可以由终端定义或者用户经由终端定义。该具体数值也可以是终端从外部接收的,例如从云端服务器接收的。
第二方面,提供一种终端,该终端具有至少两个用户识别模块,包括第一用户识别模块和第二用户识别模块,该终端还包括:存储器以及耦合于所述存储器的处理器,存储器 存储可由所述处理器执行的指令,处理器调用所述存储器中的所述指令,执行本申请第一方面任一种实施方式的网络管理方法。终端还可以包括收发装置,其检测数据业务的网络占用率并发往处理器。
具体地,该终端执行的网络管理方法包括:在第二用户识别模块上运行第一数据业务,检测第一数据业务的网络占用率,基于该网络占用率确定第一用户识别模块的搜网方式。网络占用率包括例如网络使用频率和/或吞吐量。第一数据业务指的例如是包含在终端中设置的白名单中的业务。该白名单业务指的是该终端可以批准运行且时延敏感类的数据业务。时延敏感的标准可以是终端的用户自定义的,例如通过图形用户界面设置到终端中,也可以是终端出厂时预设的,也可以是在终端运行过程中从外部例如云端、服务器接收的规则,等等。该白名单可以作为配置文件设置在终端中,也可以作为代码集成到一段程序中,等等。应理解的是,搜网方式并不意味着一定要执行搜网。可以根据场景需要而决定不搜网。检测第一数据业务的网络占用率的方式例如可以是根据第一数据业务特定时长里的网络占用率然后算出平均值。该特定时长例如是5s。
在一些可能的实现方式中,检测第一用户识别模块所处的网络类型,响应于检测结果,在网络类型是无网络的条件下,采用第一搜网方式对第一网络进行搜网,在网络类型是不同于第一网络的第二网络的条件下,采用第二搜网方式对第一网络进行搜网,该第二搜网方式不同于第一搜网方式。
在一些可能的实现方式中,第一网络是LTE网络或者比LTE更晚出现的通信网络,例如5G网络。
在一些可能的实现方式中,第二网络是2G网络。
在一些可能的实现方式中,第一搜网方式包括:在网络占用率低于网络占用率阈值的条件下,开启第一用户识别模块对第一网络的搜网。在一些可能的实现方式中,搜网直至第一时长,然后回到检测第一数据业务的网络占用率的步骤。第一时长例如为5s。
在一些可能的实现方式中,第一搜网方式包括:在网络占用率不低于网络占用率阈值的条件下,检查预设计时器是否超时,在计时器未超时的条件下,关闭第一用户识别模块对第一网络的搜网。在一些可能的实现方式中,在计时器超时的条件下,重置计时器并且开启第一用户识别模块对第一网络的搜网。在一些可能的实现方式中,关闭搜网直至第二时长,回到检测第一数据业务的网络占用率的步骤。第二时长例如是5s。在一些可能的实现方式中,搜网直至第一时长,回到检测第一数据业务的网络占用率的步骤。第一时长例如是5s。重置计时器指的是将计时器置零。对于“关闭第一用户识别模块对第一网络的搜网”,在此应理解为包含:第一用户识别模块当前在搜网,就将搜网停止;以及,第一用户识别模块当前未在搜网,就不开启搜网。对于开启搜网应理解为包含:第一用户识别模块当前在搜网,就不停止该搜网;以及,第一用户识别模块当前不在搜网,则启动其搜网。
在一些可能的实现方式中,第二搜网方式包括:在网络占用率低于网络占用率阈值的条件下,开启第一用户识别模块对第一网络的搜网。在一些可能的实现方式中,搜网直至第三时长,回到检测第一数据业务的网络占用率的步骤。第三时长例如是5s。
在一些可能的实现方式中,第二搜网方式包括:在网络占用率不低于网络占用率阈值的条件下,关闭第一用户识别模块对第一网络的搜网。在一些可能的实现方式中,关闭搜网直至第四时长,回到检测第一数据业务的网络占用率的步骤。第四时长例如是5s。
在一些可能的实现方式中,网络管理方法还包括:判断第一数据业务是否关闭或切换 到后台,响应于第一数据业务关闭或来切换到后台,或者终端锁屏,开启第一用户识别模块对第一网络的搜网。在一些可能的实现方式中,响应于第一数据业务关闭或切换到后台,或者终端锁屏,去激活第二用户识别模块上运行的第一数据业务。在一些可能的实现方式中,在第一数据业务关闭或来切换到后台后,响应于第二数据业务被设置到前台,在第一用户识别模块上建立第一数据通路以运行该切换到前台的第一数据业务。应理解的是该被设置到前台的第二数据业务与被关闭或切换到后台的第一数据业务可以相同也可以不同。第一数据业务和第二数据业务指的例如是包含在终端中设置的白名单中的业务。该白名单业务指的是该终端可以批准运行且时延敏感类的数据业务。时延敏感的标准可以是终端的用户自定义的,例如通过图形用户界面设置到终端中,也可以是终端出厂时预设的,也可以是在终端运行过程中从外部例如云端、服务器接收的规则,等等,本申请对设置方式不做限定。该白名单可以作为配置文件设置在终端中,也可以作为代码集成到一段程序中,本申请对白名单的存储和实施方式不做限定。在第一数据业务关闭或切换到后台或者终端锁屏后,可以开启第一用户识别模块的搜网和/或去激活第二用户识别模块的第一数据业务,然后等到第二数据业务被设置到前台,在第一用户识别模块建立第一数据通路。也可以在第一数据业务关闭或切换到后台或者终端锁屏后,不做第一用户识别模块的搜网也不去激活第二用户识别模块的第一数据业务,仍然等到第二数据业务被设置到前台,在第一用户识别模块建立第一数据通路。换言之,在第一数据业务关闭或切换到后台或者终端锁屏后,已经没有重要业务在当前需要网络,所以可以不搜网就利用空挡切换到第一用户识别模块上试一试业务体验和链路质量是不是能够满足预设阈值。另外,在第一数据业务关闭或切到后台或者终端锁屏的条件下,在该第二用户识别模块上去激活该第一数据业务也不是必要的,MPTCP/MPUDP协议允许终端在两个不同网络上平滑切换,因此通过在第一用户识别模块上建立第一数据通路可以将第一数据业务平滑转移到第一用户识别模块上,从而当第一数据业务被切回前台或重新激活时从用户体验角度来讲还是平滑连续地运行的。
在一些可能的实现方式中,网络管理方法还包括:检查是否有最近第五时长内更新的第一数据业务的业务体验数据可用。第五时长例如是1min,则最近第五时长指的是从做该检查的时刻起倒推1min。在一些可能的实现方式中,在检查是否有最近第五时长内更新的业务体验数据可用前先判断网络占用率是否低于网络占用率阈值,在网络占用率是不低于网络占用率阈值的条件下检查是否有最近第五时长内更新的业务体验数据可用。在一些可能的实现方式中,网络占用率不低于网络占用率阈值指的是网络使用频率不低于网络使用频率阈值并且吞吐量不低于吞吐量阈值。
在一些可能的实现方式中,响应于有最近第五时长内更新的第一数据业务的业务体验数据可用,基于该业务体验数据检查业务体验是否不低于第一业务体验阈值。“业务体验不低于第一业务体验阈值”指的是业务体验要和第一业务体验阈值一样好或者更好。在用往返时延代表业务体验时,满足业务体验阈值指的是该业务的往返时延不高于预设的往返时延阈值。在一些可能的实现方式中,响应于无最近第五时长内更新的第一数据业务的业务体验数据可用,检查第二用户识别模块的链路质量是否不低于第一链路质量阈值。
在一些可能的实现方式中,响应于业务体验不低于第一业务体验阈值,回到检查是否有最近第五时长内更新的第一数据业务的业务体验数据可用的步骤。在一些可能的实现方式中,响应于链路质量不低于第一链路质量阈值,回到检查是否有最近第五时长内更新的 第一数据业务的业务体验数据可用的步骤。
在一些可能的实现方式中,响应于业务体验低于第一业务体验阈值,或者响应于链路质量低于第一链路质量阈值,将第二用户识别模块的链路质量与第一用户识别模块的链路质量相比较,响应于第一用户识别模块的链路质量在第二用户识别模块的链路质量以下,返回检测第二用户识别模块的业务体验和链路质量的步骤。在一些可能的实现方式中,第一用户识别模块的链路质量是存储在终端中的,例如是切换到第二用户识别模块之前最后记录的第一用户识别模块的链路质量。“业务体验低于第一业务体验阈值”指的是业务体验比第一业务体验阈值差。在用往返时延代表业务体验时,满足业务体验阈值指的是该业务的往返时延高于预设的往返时延阈值。
在一些可能的实现方式中,响应于第一用户识别模块的链路质量高于第二用户识别模块的链路质量,开启第一用户识别模块对第一网络的搜网。在一些可能的实现方式中,响应于第一用户识别模块的链路质量高于第二用户识别模块的链路质量,去激活第二用户识别模块上运行的第一数据业务。在一些可能的实现方式中,响应于第一用户识别模块的链路质量高于第二用户识别模块的链路质量,在第一用户识别模块上建立第一数据通路并且将第一数据业务转移到第一用户识别模块上。在一些可能的实现方式中,第一用户识别模块的链路质量是存储在终端中的,例如是切换到第二用户识别模块之前最后记录的第一用户识别模块的链路质量。在第一用户识别模块的链路质量高于第二用户识别模块的链路质量的条件下,可以开启第一用户识别模块的搜网和/或在第二用户识别模块上去激活第一数据业务,然后切换到第一用户识别模块建立第一数据通路。也可以不做第一用户识别模块的搜网,也不在第二用户识别模块上去激活第一数据业务,直接切到第一用户识别模块。因为此时第二用户识别模块的用户体验已然不满足阈值,第一用户识别模块在切到第二用户识别模块之前的链路质量又更高,所以即使先不对第一用户识别模块进行搜网,也可以切回第一用户识别模块尝试一下体验会不会优于第二用户识别模块。而由于MPTCP/MPUDP协议允许平滑切换网络,即使先不在第二用户识别模块上去激活第一数据业务,也预期该第一数据业务可以平滑切换到第一用户识别模块上而不会出现错乱。
在一些可能的实现方式中,网络管理方法还包括:响应于第一数据业务被设置到前台,在第一用户识别模块上建立第一数据通路以运行第一数据业务,检查是否有最近第六时长内更新的第一数据业务的业务体验数据可用。第六时长例如是1min,则最近第六时长指的是从做该检查的时刻起倒推1min。
在一些可能的实现方式中,响应于有最近第六时长内更新的第一数据业务的业务体验数据可用,基于该业务体验数据检查业务体验是否不低于第二业务体验阈值。“业务体验不低于第二业务体验阈值”指的是业务体验要和第二业务体验阈值一样好或者更好。在用往返时延代表业务体验时,满足业务体验阈值指的是该业务的往返时延不高于预设的往返时延阈值。在一些可能的实现方式中,响应于无最近第六时长内更新的第一数据业务的业务体验数据可用,检查第二用户识别模块的链路质量是否不低于第二链路质量阈值。
在一些可能的实现方式中,响应于业务体验不低于第二业务体验阈值,回到检查是否有最近第六时长内更新的第一数据业务的业务体验数据可用的步骤。在一些可能的实现方式中,响应于链路质量不低于第二链路质量阈值,回到检查是否有最近第六时长内更新的第一数据业务的业务体验数据可用的步骤。
在一些可能的实现方式中,响应于业务体验低于第二业务体验阈值,或者响应于链路 质量低于第二链路质量阈值,在第二用户识别模块上建立第二数据通路,将该第一数据业务迁移到第二用户识别模块上。在一些可能的实现方式中,还关闭第一用户识别模块的搜网。在一些可能的实现方式中,在第一用户识别模块上的业务体验低于第二业务体验阈值或者第一用户识别模块上的链路质量低于第二链路质量阈值的条件下,还判断是否不低于老化时间,在不低于老化时间的条件下才在第二用户识别模块上建立第二数据通路,将该第一数据业务迁移到第二用户识别模块上。老化时间物理含义是上次从第一用户识别模块切换到第二用户识别模块的时间算起到此次判断老化时间这一时刻的时间,具体数值可以由终端定义或者用户经由终端定义。该具体数值也可以是终端从外部接收的,例如从云端服务器接收的。
第三方面,提供一种计算机存储介质,包括计算机指令,当计算机指令在终端上运行时,使得终端执行第一方面任一项可能的实现方式中的网络管理方法。
第四方面,提供一种计算机程序产品,当计算机程序产品在终端上运行时,使得终端执行第一方面任一项可能的实现方式中的网络管理方法。
本申请的这些和其他方面在以下(多个)实施例的描述中会更加简明易懂。
附图说明
图1是本申请实施例提供的网络管理方法的流程图。
图2是图1中步骤130A的详细描述。
图3A是网络占用率不满足阈值的场景。
图3B是网络占用率满足阈值的场景。
图4是图1中步骤130B的详细描述。
图5是对图1中步骤130C的详细描述。
图6示出了将目标数据业务迁移到卡2上运行的方法。
[根据细则91更正 28.01.2019] 
图7示出了本发明实施例提供的网络管理方法的纵览。
图8是本发明实施例的电子设备的结构示意图。
图9是本发明实施例的电子设备的软件结构框图。
具体实施方式
为了便于理解,示例的给出了部分与本申请实施例相关概念的说明以供参考。如下所示:
用户识别模块,其安全存储国际移动用户识别码(International Mobile Subscriber Identification Number,IMSI)和相关秘钥,用于移动终端上用户在移动通信网络中的身份识别以及鉴权。用户识别模块可以由集成电路构成,也可以由软件构成。用户识别模块例如实现为SIM卡。
搜网,指的是搜索适合的无线信号覆盖区域,以供终端进行数据业务。如果目标无线信号覆盖区域是LTE网络中的,则搜网指的是UE要接入LTE网络而必须经过的小区搜索过程(cell search procedure),目的是找到适合驻留的小区。如果目标无线信号覆盖区域是5G网络中的,搜网指的也是找到适合驻留的小区。
往返时延(round-trip time,RTT),指的是从发送端发送数据开始,到发送端收到来自接收端的确认(接收端收到数据后便立即发送确认),总共经历的时延。
信噪比(signal-to-noise ratio,SNR),定义为信号功率与噪声功率的比。
参考信号接收功率(reference signal receiving power,RSRP),定义为考虑的测量频率带宽上承载参考信号的资源元素(RE)上的接收功率(以瓦为单位)的线性平均值。是LTE网络中可以代表无线信号强度的关键参数。
用户识别卡(subscriber identity module,SIM),主要用于存储用户身份识别数据、短信数据和电话号码的智能卡。
数据通路,指的是移动终端与基站之间的数据报文传输连接。
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。其中,在本申请实施例的描述中,除非另有说明,“/”表示或的意思,例如,A/B可以表示A或B;本文中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,在本申请实施例的描述中,“多个”是指两个或多于两个。
以下,术语“第一”、“第二”等仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”等的特征可以明示或者隐含地包括一个或者更多个该特征。在本申请实施例的描述中,除非另有说明,“多个”的含义是两个或两个以上。
本申请实施例的技术方案适用于任何可以被实现为具有无线通信功能的便携式通信终端,包括:便携式终端、移动终端、通信终端、便携式通信终端、便携式移动终端、显示设备等等。对应于市场上的产品,终端可以对应于智能电话、便携式电话、游戏机、电视、显示单元、用于车辆的抬头显示单元、笔记本计算机、膝上型计算机、平板个人计算机(PC)、个人媒体播放器(PMP)器、个人数字助理(PDA)等等。
终端可以与诸如服务器等的外部电子设备通信,或者通过与外部电子设备交互工作来执行操作。网络可以是移动或蜂窝通信网络。
图1示出了本申请实施例提供的网络管理方法的流程图。
网络管理方法100用于终端的搜网策略制定,例如用于智能手机。该终端上具有例如两个用户识别模块,例如两张SIM卡,以下称为卡1和卡2。在一些实施例中,该终端能够支持两种制式,因此卡1和卡2可以由不同的移动通信运营商运营。在一些实施方式中,多路技术可以应用于双卡环境,业务首先使用其中一张卡,建立第一条MPTCP数据通路(FirstFlow),当该卡的业务体验不满足业务需要时,可以动态建立第二条MPTCP数据通路(SecondFlow),从而将业务的数据流量平滑切换到另一张卡或两张卡同时冗余发送数据,以充分利用两个运营商的网络能力,保证最佳的业务通信体验。
为了运行卡1和卡2,终端可以具有一套射频装置以分时多工的方式支持卡1和卡2的数据业务,也可以具有两套分别专用于卡1和卡2的射频装置。SIM卡可以是插入终端卡槽中的两张物理上分离的实体SIM卡,也可以是集成到终端内部的eSIM卡,则两个用户识别模块可以是在该eSIM卡上从逻辑上划分出的两张卡。该终端上也可以具有多于两张SIM卡。
在一些实施例中,卡1上的流量合同使得运行数据业务时在资费上更为经济,因此终端用户将其设置为主卡,即在卡1能够驻留在LTE网络或更新代网络、例如5G网络时优先使用卡1运行数据业务。该设置例如可以通过图形用户界面操作。相应地,将卡2设置为副卡,在卡1的网络质量不能够支持达到阈值的业务体验时手动或自动切换到卡2,以 将卡1上的数据业务通过MPTCP/MPUDP协议平滑切换到卡2上以保证用户的不间断业务体验,或者是在卡2上运行新的数据业务。
然而,如上面所说,卡2可能由于流量资费、个人需求等原因而不适合持久运行数据业务。因此在卡2运行数据业务时终端会进行卡1的搜网,例如搜索LTE网络中适合驻留的小区,未来5G网络中也是搜索适合驻留的5G网络区域,以便在找到时及时切回卡1运行数据业务。然而在使用卡2运行数据业务时,卡2代表了当前用户体验,卡1的搜网会抢占有限的空口资源,进而影响卡2上的体验。例如当卡2上正在运行时延敏感类业务时,卡1的搜网会引起卡2体验的明显劣化。例如用户在玩网络游戏时,150ms以上的时延会使得用户体验到操作响应对于手对鼠标的操作而言有所迟滞,语音/视频通话时,300ms以上的时延使得用户体验到通话对象对自己语音的响应有迟缓。
图1中示出的本发明实施例提供的网络管理方法根据终端的不同运行场景来提供不同的搜网方式,以在保障用户当前体验的条件下有效搜网。步骤110描述了当前正在用卡2运行目标数据业务。目标数据业务可以是时延敏感类业务,例如打电子游戏。在步骤120中检测电子游戏的网络占用率。网络占用率在本申请中指的是目标数据业务对网络的占用情况,包括频率和带宽。在本实施例中检测方式是跟踪最近5s的网络占用率,然后取时间上的平均值。在另一些实施例中,也可以采用其他检测方法,比如检测当前瞬时的网络占用率,检测特定时刻的网络占用率,检测更长或更短时段的平均网络占用率等等。在本实施例中,网络占用率包括网络使用频率和吞吐量。网络使用频率指的是特定时段里面数据包的传输频率,计算方式例如,5s内,如果每秒都有发包,网络使用频率是100%,如果只有4s发包,网络使用频率是4/5即80%。吞吐量指的是单位时间中发送的数据量大小,例如单位时间中发送的比特数。
承接于步骤120的是并行的步骤130A、130B和130C。在步骤130A中,根据卡1当前的网络类型来进行相应的网络管理。在步骤130B中,根据卡2上目标数据业务的用户体验来进行网络管理。在步骤130C中,响应于目标数据业务离开前台而进行网络管理。目标数据业务离开前台的情况包括目标数据业务切换到后台,目标数据业务关闭和终端锁屏。
图2是图1中步骤130A的详细描述,即如何根据卡1当前的网络类型来进行相应的搜网调度。
在步骤201中检测卡1当前所处的网络类型。当卡1处于可以执行基本业务、例如接打电话,但是非目标网络时,在卡2上目标数据业务网络占用率较低的间隙搜网。在本实施例中,卡1目前处于2G网络,搜网的目标是4G网络。本领域技术人员可以理解的是,以此类推,例如在5G网络时代,可能卡1目前处于4G,而搜网的目标是5G网络。具体地,判断图1中步骤120中检测出的网络占用率是否满足预设的网络占用率阈值。在本实施例中仍以游戏作为目标数据业务,首先通过网络使用频率得出数据包发送的稀疏度,以判断目标数据业务是否在运行和运行的状况。
如果数据包较为稀疏,例如5s中只有两次发包,如图3A所示,可以认为业务并不需要密集数据流,此时即使短时搜网也不会影响业务的进行和用户对业务的体验。当前游戏业务例如是玩家(即用户)在备战室聊天等待被匹配的场景。玩家1询问玩家2是否已到达同一备战室,玩家2几秒钟后回复说已到达。在该场景下,网络占用率不满足预设网络占用率阈值,例如网络使用频率不满足预设的80%的阈值,吞吐量也由于文字聊天单位时 间内数据量较小而不满足预设阈值。则在该场景下开启卡1的搜网。在本实施例中,在图2的步骤202开启搜网直至特定时长,例如5s,然后回到图1中的步骤120,即再次采集最近的网络占用率。在另一些实施方式中,通话中通话各方沉默或寡言的场景中,虽然网络使用率较高但吞吐量小,也会触发卡1的搜网。
如果数据较为密集,例如5s中每秒都有发包,如图3B所示,例如此场景是游戏已经开始,玩家已进入紧张的作战状态。在该场景下,网络使用频率是100%,超过预设阈值,吞吐量也由于密集而规则的数据流而超过预设阈值,从而使得网络占用率不低于预设的网络占用率阈值。在这种情况下,在本实施例中认为如果让卡1搜网会明显阻碍游戏业务的平滑进行,和造成玩家业务体验的明显劣化。例如,如果卡1搜网造成卡2上运行的游戏时延200ms以上,玩家会感觉到卡顿,150ms以上感觉到不跟手,即鼠标或键盘操作后游戏的响应不是即时的,有所迟滞。例如鼠标拖动一个物体时物体因移动速度落后于光标而显得粘滞。因此在图2的步骤203中关闭主卡搜网。在本实施例中关闭卡1搜网直至特定时长,例如5s,然后回到图1中的步骤120,即再次检测最近的网络占用率。在另一些实施例中,语音通话中通话各方在激辩,则网络使用频率和吞吐量都超过阈值,也会触发关闭卡1搜网。
应理解的是,关闭主卡搜网的含义包括了:如果现在主卡本来就在搜网,就停止搜网;如果现在主卡没有在搜网,就不启动其搜网。开启搜网也应被理解为:如果现在主卡没在搜网,就开始搜网;如果现在主卡已经在搜网,就不停止其搜网。因为要考虑到本实施例中有三条并行的判断线路在执行搜网调度,有可能在按照卡1网络类型搜网中未开启卡1搜网时,其已经在其他线路中被开启,同样,在按照卡1网络类型搜网中未走到关闭卡1搜网这一步时,它已经在其他线路中被关闭。
回到图2,如果卡1目前无网络,则除了寻找卡2上目标数据业务网络占用率低的间隙进行卡1搜网之外,还设定定时器周期搜网。具体地,如果图1中步骤120获取的网络占用率低于预设的网络占用率阈值,即例如图3A所示的备战场景中(只是此时卡1为无网络),在图2的步骤204中开启卡1搜网。在本实施例中,开启卡1搜网直至特定时长,例如5s,就回到图1中步骤120,即再次检测网络占用率。如果图1中步骤120获取的网络占用率不低于预设的网络占用率阈值,即例如图3B所示的作战场景中(只是此时卡1为无网络),则在图2的步骤205中检测预设计时器是否超时,如果计时器超时了,则在步骤206中重置计时器,即将计时器清零,并且在步骤204中开启卡1搜网。仍然可以搜网直至特定时长,例如5s,然后回到图1中步骤120。如果计时器没有超时,则在步骤207中关闭卡1搜网。例如可以关闭直至特定时长,例如5s,就回到图1中步骤120,即再次检测网络占用率。从而保证了从卡2上目标数据业务中找不到网络占用率较低的搜网间隙时仍能保证搜网,以避免卡1较长时间断网而错过重要业务。
图4是图1中步骤130B的详细描述,即根据卡2上目标数据业务的业务体验来进行搜网调度。首先在步骤401中判断步骤120(图4中的步骤120即为图1中的步骤120)中获取的网络占用率是否不低于网络占用率阈值,据此判断目标数据业务是否处在活跃运行的状态。
如果网络占用率低于阈值,例如数据包过于稀疏,则目标数据业务现在不活跃,例如在图3A的备战场景中,或者语音通话中通话各方沉默的场景中,则在该实施例中认为此时去采集的业务体验数据和基于该业务体验数据所做的判断是难以代表用户真实体验的, 也即不适合用步骤130B这条线做搜网调度,则回到步骤120,即再次检测网络占用率。在另一些实施例中,认为目标数据业务只要网络占用率不为0,即还在运行就可以根据业务体验来进行搜网调度,那么也可以将判断网络占用率是否不低于网络占用率阈值的步骤省去,从步骤120B直接到判断业务体验和链路质量是否满足阈值的步骤。
如果步骤120中获取的网络占用率不低于阈值,则在步骤402中检查是否有最近特定时长中是否有卡2上目标数据业务的业务体验数据可用。特定时长例如是1min,则最近特定时长指的是从做该检查的时刻起回溯1min。如果1分钟内业务数据都没得到更新,即没有数据包的传送,认为没有可以作为后续判断基础的业务体验数据。如果有业务体验数据可用,在步骤403A中基于该业务体验数据检查业务体验是否不低于业务体验阈值。相反,如果没有业务体验数据可用,在步骤403B中检查卡2的链路质量是否不低于链路质量阈值。业务体验可以用参数RTT来代表。RTT的阈值设定取决于目标数据业务的类型,如果是游戏业务,可以将阈值设为例如150ms,则业务体验不低于业务体验阈值至的是业务的RTT不高于150ms。链路质量在不同的网络中可以用不同的参数来代表。在4G网络中可以用RSRP来代表。在上述检测卡2上目标数据业务的业务体验和卡2的链路质量是否满足阈值的步骤中,例如RSRP不低于-115dBm认为链路质量满足阈值。在2G网络中,可以用SNR代表链路质量。
响应于业务体验不低于业务体验阈值,或者链路质量不低于链路质量阈值,回到步骤402再次检查是否有最近特定时长中是否有卡2上目标数据业务的业务体验数据可用。
响应于业务体验低于业务体验阈值,或者链路质量低于链路质量阈值,则在步骤404中将卡2的链路质量与卡1的链路质量相比较。在本实施例中,卡1的链路质量是存储在终端中的数据,代表的是最近一次从卡1切换到卡2时记录的卡1的链路质量。在另一些实施例中,卡1的链路质量也可以是当前测量的数据,等等。如果卡1的链路质量比卡2的链路质量高,则在步骤405中切换到卡1,在卡1上建立数据通路和运行数据业务。根据MPTCP/MPUDP协议,允许数据业务在两张SIM卡之间平滑切换。在一些实施例中,在切回卡1之前,还可以开启卡1搜网,和/或去激活卡2上的目标数据业务。
图5是对图1中步骤130C的详细描述。当在步骤501中检测到目标数据业务关闭或切换到后台,或者终端锁屏时,在步骤502开启主卡搜网。此时用户体验不到目标数据业务,所以在该场景下搜网不会影响用户体验。但是在该场景下的搜网不是必须的。还可以在步骤503中去激活副卡数据业务,但该步骤也不是必须的。如果在该场景下有白名单上的数据业务到达前台,则可以切换到卡1,在卡1上建立数据通路运行数据业务。因为在该实施例中如在描述图1时所设的前提条件,即卡1是主卡,或者流量卡,则在卡2不以影响用户体验的方式运行数据业务的条件下,可以切回卡1以尝试是否可以用卡1以满足用户体验的方式运行数据业务。以Android操作系统为例,可以通过调用foreground.get()函数检测数据业务是否在前台,返回结果为true,即为真,表示在前台,返回结果为false,即为假,表示在后台。
图6示出了将目标数据业务迁移到卡2上运行的方法。在该方法600中,在终端启动后,如果有白名单业务到前台,即步骤601将其作为目标数据业务,在步骤602卡1上建立第一条数据通路以运行该目标数据业务。该白名单业务指的是该终端可以批准运行且时延敏感类的数据业务。时延敏感的标准可以是终端的用户自定义的,例如通过图形用户界面设置到终端中,也可以是终端出厂时预设的,也可以是在终端运行过程中从外部例如云 端、服务器接收的规则,等等。该白名单可以作为配置文件设置在终端中,也可以作为代码集成到一段程序中,等等。
接下来在步骤603中检查是否有最近特定时长中是否有卡1上目标数据业务的业务体验数据可用。特定时长例如是1min,则最近特定时长指的是从做该检查的时刻起回溯1min。如果1分钟内业务数据都没得到更新,即没有数据包的传送,认为没有可以作为后续判断基础的业务体验数据。如果有业务体验数据可用,在步骤604A中基于该业务体验数据检查业务体验是否不低于业务体验阈值。相反,如果没有业务体验数据可用,在步骤604B中检查卡1的链路质量是否不低于链路质量阈值。业务体验可以用参数RTT来代表。RTT的阈值设定取决于目标数据业务的类型,如果是游戏业务,可以将阈值设为例如150ms,则业务体验不低于业务体验阈值至的是业务的RTT不高于150ms。链路质量在不同的网络中可以用不同的参数来代表。在4G网络中可以用RSRP来代表。在上述检测卡2上目标数据业务的业务体验和卡2的链路质量是否满足阈值的步骤中,因为在此对链路质量的判断是用于后续判断是否切到卡2,可以将链路质量阈值设置得比图4中判断链路质量以决定是否继续在卡2上运行业务时高一些,例如设置为-105dBm。也可以较为粗略地根据终端屏幕上显示的信号强度格数来判断,如果5格中有3格是亮的认为链路质量满足阈值。在2G网络中,可以用SNR代表链路质量。
在步骤605中判断是否低于老化时间,老化时间指的是上次从卡1切到卡2开始计时,到步骤605的时间,具体数值可以由终端或用户设置。在本实施例中将老化时间设置为2min。在另一些实施例中,老化时间可以为其他数值,例如1min。如果低于老化时间,回到检查是否有最近特定时长中是否有卡1上目标数据业务的业务体验数据可用的步骤603。从而避免了主卡与副卡之间的频繁切换,也称为“防乒乓”。如果不低于老化时间,在步骤606中,在卡2上建立第二条数据通路。在步骤607中,将目标数据业务迁移到卡2上。在步骤608中,关闭主卡搜网。
图7示出了本发明实施例提供的网络管理方法的纵览。其各个部分和步骤已基于图1-6进行了描述,在此仅简单描述。白名单业务到前台后,卡1建立数据通路以运行该业务,后面将其称作目标数据业务。在例如最近1min有业务体验数据的条件下,判断业务体验是否满足阈值,没有业务体验数据则判断链路质量是否满足阈值。在业务体验或链路质量满足阈值的条件下返回再次检测最近1min有没有业务体验数据可用。如果业务体验或链路质量不满足阈值,则切到卡2建立数据通路,并且将卡1上目标业务迁移到卡2上继续运行。将卡1搜网关闭。采集卡2上目标业务例如最近5s的网络占用率。接下来是三条并行的搜网调度判断逻辑。第一条按照卡1当前的网络类型来判断,具体方法参考图2及其描述。第二条按照卡2当前业务体验来判断,具体方法参考图4及其描述。第三条按照目标业务是否切到后天或关闭以及终端是否锁屏来判断,具体方法参考图5及其描述。
以玩电子游戏为例,玩家1在手机上打开游戏app,则游戏作为白名单业务到前台成为了目标数据业务。玩家1手机上电信的包月无限流量卡被设置成主卡。先在主卡上建立第一数据通路运行游戏。检查是否有最近1min内更新的业务体验数据可用,有的话检查其是否满足阈值。没有业务体验数据可用则检查链路质量是否满足阈值。如果业务体验或链路质量满足阈值,则再次检查是否有最近1min内更新的业务体验数据可用。如果如果业务体验或链路质量不满足阈值,则检查距上次切到副卡的时间有没有达到预设的老化时间1min。达不到就返回检查是否有最近1min内更新的业务体验数据可用的步骤。则在手 机的副卡、例如为包含每月1G流量的联通卡上建立数据业务,将游戏利用多路技术平滑迁移到副卡上。接下来采集副卡上游戏5s内的网络占用率,并进行三路并行搜网调度分析。
第一路,检查主卡现在是否处在2G或无网。如果是2G,检查网络占用率是否达到阈值,如果达到了,说明游戏正在战斗状态,此时进行主卡搜网会负面影响玩家1的游戏体验,例如卡顿。因此再次采集网络占用率。相反,如果网络占用率达不到阈值,说明游戏正在备战状态,此时偷时隙进行主卡搜网也不会影响玩家1的体验,因此搜网5s,搜到了4G就切回主卡,搜不到就返回采集副卡上游戏5s内的网络占用率的步骤。如果上面的检查结果是主卡处在无网,则即使副卡上游戏的网络占用率达到了阈值,还要检查预设的计时器是否溢出,如果溢出,仍要搜网5s。
第二路,检查副卡上游戏的业务体验是否满足阈值。在此之前先检查网络占用率是否达到阈值,如果结果是否定的,说明现在业务没有密集进行那么业务体验数据也是不值得考察的,则回到采集副卡上游戏5s内的网络占用率的步骤。如果网络占用率达到了阈值,再看是否有最近1min内更新的业务体验数据可用,没有就再次检查。如果有业务体验数据可用,则判断业务体验是否满足阈值,满足就再次检查是否有业务体验数据可用,不满足则切回主卡,将游戏平滑移回卡1。
第三路,如果游戏离开前台,例如切到后台,关闭,或者手机锁屏。则可以在有白名单业务到前台的条件下切回主卡,该白名单业务可以是同一游戏,也可以是其他业务,例如淘宝。或者,在游戏离开前台后也可以先主卡搜网和/或在副卡上去激活游戏,再等到有白名单业务到前台后切回主卡。
接下来以图8所示的电子设备800为例对本申请实施例所适用的终端进行介绍。图7示出了本申请实施例提供的电子设备800的结构示意图。
电子设备800可以包括处理器810,外部存储器接口820,内部存储器821,通用串行总线(universal serial bus,USB)接口830,充电管理模块840,电源管理模块841,电池842,天线1,天线2,移动通信模块850,无线通信模块860,音频模块870,扬声器870A,受话器870B,麦克风870C,耳机接口870D,传感器模块880,按键890,马达891,指示器892,摄像头893,显示屏894,以及用户标识模块(subscriber identification module,SIM)卡接口895等。其中传感器模块880可以包括压力传感器880A,陀螺仪传感器880B,气压传感器880C,磁传感器880D,加速度传感器880E,距离传感器880F,接近光传感器880G,指纹传感器880H,温度传感器880J,触摸传感器880K,环境光传感器880L,骨传导传感器880M等。
可以理解的是,本发明实施例示意的结构并不构成对电子设备800的具体限定。在本申请另一些实施例中,电子设备800可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。
处理器810可以包括一个或多个处理单元,例如:处理器810可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,存储器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。
其中,控制器可以是电子设备800的神经中枢和指挥中心。控制器可以根据指令操作码和时序信号,产生操作控制信号,完成取指令和执行指令的控制。
处理器810中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器810中的存储器为高速缓冲存储器。该存储器可以保存处理器810刚用过或循环使用的指令或数据。如果处理器810需要再次使用该指令或数据,可从所述存储器中直接调用。避免了重复存取,减少了处理器810的等待时间,因而提高了系统的效率。本申请实施例提供的网络管理方法可以作为指令存储在存储器中,由处理器810调用和运行以实施该网络管理方法。搜网调度中所使用的动态更新的网络占用率参数由移动通信模块850检测和传送给处理器810。下文中会进一步介绍移动通信模块850。
在一些实施例中,处理器810可以包括一个或多个接口。接口可以包括集成电路(inter-integrated circuit,I2C)接口,集成电路内置音频(inter-integrated circuit sound,I2S)接口,脉冲编码调制(pulse code modulation,PCM)接口,通用异步收发传输器(universal asynchronous receiver/transmitter,UART)接口,移动产业处理器接口(mobile industry processor interface,MIPI),通用输入输出(general-purpose input/output,GPIO)接口,用户标识模块(subscriber identity module,SIM)接口,和/或通用串行总线(universal serial bus,USB)接口等。
I2C接口是一种双向同步串行总线,包括一根串行数据线(serial data line,SDA)和一根串行时钟线(derail clock line,SCL)。在一些实施例中,处理器810可以包含多组I2C总线。处理器810可以通过不同的I2C总线接口分别耦合触摸传感器880K,充电器,闪光灯,摄像头893等。例如:处理器810可以通过I2C接口耦合触摸传感器880K,使处理器810与触摸传感器880K通过I2C总线接口通信,实现电子设备800的触摸功能。
I2S接口可以用于音频通信。在一些实施例中,处理器810可以包含多组I2S总线。处理器810可以通过I2S总线与音频模块870耦合,实现处理器810与音频模块870之间的通信。在一些实施例中,音频模块870可以通过I2S接口向无线通信模块860传递音频信号,实现通过蓝牙耳机接听电话的功能。
PCM接口也可以用于音频通信,将模拟信号抽样,量化和编码。在一些实施例中,音频模块870与无线通信模块860可以通过PCM总线接口耦合。在一些实施例中,音频模块870也可以通过PCM接口向无线通信模块860传递音频信号,实现通过蓝牙耳机接听电话的功能。所述I2S接口和所述PCM接口都可以用于音频通信。
UART接口是一种通用串行数据总线,用于异步通信。该总线可以为双向通信总线。它将要传输的数据在串行通信与并行通信之间转换。在一些实施例中,UART接口通常被用于连接处理器810与无线通信模块860。例如:处理器810通过UART接口与无线通信模块860中的蓝牙模块通信,实现蓝牙功能。在一些实施例中,音频模块870可以通过UART接口向无线通信模块860传递音频信号,实现通过蓝牙耳机播放音乐的功能。
MIPI接口可以被用于连接处理器810与显示屏894,摄像头893等外围器件。MIPI接口包括摄像头串行接口(camera serial interface,CSI),显示屏串行接口(display serial interface,DSI)等。在一些实施例中,处理器810和摄像头893通过CSI接口通信,实现电子设备800的拍摄功能。处理器810和显示屏894通过DSI接口通信,实现电子设备800的显示功能。
GPIO接口可以通过软件配置。GPIO接口可以被配置为控制信号,也可被配置为数据 信号。在一些实施例中,GPIO接口可以用于连接处理器810与摄像头893,显示屏894,无线通信模块860,音频模块870,传感器模块880等。GPIO接口还可以被配置为I2C接口,I2S接口,UART接口,MIPI接口等。
USB接口830是符合USB标准规范的接口,具体可以是Mini USB接口,Micro USB接口,USB Type C接口等。USB接口830可以用于连接充电器为电子设备800充电,也可以用于电子设备800与外围设备之间传输数据。也可以用于连接耳机,通过耳机播放音频。该接口还可以用于连接其他电子设备,例如AR设备等。
可以理解的是,本发明实施例示意的各模块间的接口连接关系,只是示意性说明,并不构成对电子设备800的结构限定。在本申请另一些实施例中,电子设备800也可以采用上述实施例中不同的接口连接方式,或多种接口连接方式的组合。
充电管理模块840用于从充电器接收充电输入。其中,充电器可以是无线充电器,也可以是有线充电器。在一些有线充电的实施例中,充电管理模块840可以通过USB接口830接收有线充电器的充电输入。在一些无线充电的实施例中,充电管理模块840可以通过电子设备800的无线充电线圈接收无线充电输入。充电管理模块840为电池842充电的同时,还可以通过电源管理模块841为电子设备供电。
电源管理模块841用于连接电池842,充电管理模块840与处理器810。电源管理模块841接收电池842和/或充电管理模块840的输入,为处理器810,内部存储器821,外部存储器,显示屏894,摄像头893,和无线通信模块860等供电。电源管理模块841还可以用于监测电池容量,电池循环次数,电池健康状态(漏电,阻抗)等参数。在其他一些实施例中,电源管理模块841也可以设置于处理器810中。在另一些实施例中,电源管理模块841和充电管理模块840也可以设置于同一个器件中。
电子设备800的无线通信功能可以通过天线1,天线2,移动通信模块850,无线通信模块860,调制解调处理器以及基带处理器等实现。
天线1和天线2用于发射和接收电磁波信号。电子设备800中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如:可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。
移动通信模块850可以提供应用在电子设备800上的包括2G/3G/4G/5G等无线通信的解决方案。移动通信模块850可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。移动通信模块850可以由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调处理器进行解调。移动通信模块850还可以对经调制解调处理器调制后的信号放大,经天线1转为电磁波辐射出去。移动通信模块850包括收发装置,用于采集电子设备800上SIM卡上运行的数据业务的网络占用率。收发装置包括天线1,IC芯片和用于控制天线1和IC芯片运行的驱动,该驱动实施为软件。在一些实施例中,移动通信模块850的至少部分功能模块可以被设置于处理器810中。在一些实施例中,移动通信模块850的至少部分功能模块可以与处理器810的至少部分模块被设置在同一个器件中。
调制解调处理器可以包括调制器和解调器。其中,调制器用于将待发送的低频基带信号调制成中高频信号。解调器用于将接收的电磁波信号解调为低频基带信号。随后解调器将解调得到的低频基带信号传送至基带处理器处理。低频基带信号经基带处理器处理后,被传递给应用处理器。应用处理器通过音频设备(不限于扬声器870A,受话器870B等)输 出声音信号,或通过显示屏894显示图像或视频。在一些实施例中,调制解调处理器可以是独立的器件。在另一些实施例中,调制解调处理器可以独立于处理器810,与移动通信模块850或其他功能模块设置在同一个器件中。
无线通信模块860可以提供应用在电子设备800上的包括无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。无线通信模块860可以是集成至少一个通信处理模块的一个或多个器件。无线通信模块860经由天线2接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器810。无线通信模块860还可以从处理器810接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。
在一些实施例中,电子设备800的天线1和移动通信模块850耦合,天线2和无线通信模块860耦合,使得电子设备800可以通过无线通信技术与网络以及其他设备通信。所述无线通信技术可以包括全球移动通讯系统(global system for mobile communications,GSM),通用分组无线服务(general packet radio service,GPRS),码分多址接入(code division multiple access,CDMA),宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA),长期演进(long term evolution,LTE),BT,GNSS,WLAN,NFC,FM,和/或IR技术等。所述GNSS可以包括全球卫星定位系统(global positioning system,GPS),全球导航卫星系统(global navigation satellite system,GLONASS),北斗卫星导航系统(beidou navigation satellite system,BDS),准天顶卫星系统(quasi-zenith satellite system,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。
电子设备800通过GPU,显示屏894,以及应用处理器等实现显示功能。GPU为图像处理的微处理器,连接显示屏894和应用处理器。GPU用于执行数学和几何计算,用于图形渲染。处理器810可包括一个或多个GPU,其执行程序指令以生成或改变显示信息。
显示屏894用于显示图像,视频等。显示屏894包括显示面板。显示面板可以采用液晶显示屏(liquid crystal display,LCD),有机发光二极管(organic light-emitting diode,OLED),有源矩阵有机发光二极体或主动矩阵有机发光二极体(active-matrix organic light emitting diode的,AMOLED),柔性发光二极管(flex light-emitting diode,FLED),Miniled,MicroLed,Micro-oLed,量子点发光二极管(quantum dot light emitting diodes,QLED)等。在一些实施例中,电子设备800可以包括1个或N个显示屏894,N为大于1的正整数。
电子设备800可以通过ISP,摄像头893,视频编解码器,GPU,显示屏894以及应用处理器等实现拍摄功能。
ISP用于处理摄像头893反馈的数据。例如,拍照时,打开快门,光线通过镜头被传递到摄像头感光元件上,光信号转换为电信号,摄像头感光元件将所述电信号传递给ISP处理,转化为肉眼可见的图像。ISP还可以对图像的噪点,亮度,肤色进行算法优化。ISP还可以对拍摄场景的曝光,色温等参数优化。在一些实施例中,ISP可以设置在摄像头893中。
摄像头893用于捕获静态图像或视频。物体通过镜头生成光学图像投射到感光元件。感光元件可以是电荷耦合器件(charge coupled device,CCD)或互补金属氧化物半导体 (complementary metal-oxide-semiconductor,CMOS)光电晶体管。感光元件把光信号转换成电信号,之后将电信号传递给ISP转换成数字图像信号。ISP将数字图像信号输出到DSP加工处理。DSP将数字图像信号转换成标准的RGB,YUV等格式的图像信号。在一些实施例中,电子设备800可以包括1个或N个摄像头893,N为大于1的正整数。
数字信号处理器用于处理数字信号,除了可以处理数字图像信号,还可以处理其他数字信号。例如,当电子设备800在频点选择时,数字信号处理器用于对频点能量进行傅里叶变换等。
视频编解码器用于对数字视频压缩或解压缩。电子设备800可以支持一种或多种视频编解码器。这样,电子设备800可以播放或录制多种编码格式的视频,例如:动态图像专家组(moving picture experts group,MPEG)1,MPEG2,MPEG3,MPEG4等。
NPU为神经网络(neural-network,NN)计算处理器,通过借鉴生物神经网络结构,例如借鉴人脑神经元之间传递模式,对输入信息快速处理,还可以不断的自学习。通过NPU可以实现电子设备800的智能认知等应用,例如:图像识别,人脸识别,语音识别,文本理解等。
外部存储器接口820可以用于连接外部存储卡,例如Micro SD卡,实现扩展电子设备800的存储能力。外部存储卡通过外部存储器接口820与处理器810通信,实现数据存储功能。例如将音乐,视频等文件保存在外部存储卡中。
内部存储器821可以用于存储计算机可执行程序代码,所述可执行程序代码包括指令。处理器810通过运行存储在内部存储器821的指令,从而执行电子设备800的各种功能应用以及数据处理。内部存储器821可以包括存储程序区和存储数据区。其中,存储程序区可存储操作系统,至少一个功能所需的应用程序(比如声音播放功能,图像播放功能等)等。存储数据区可存储电子设备800使用过程中所创建的数据(比如音频数据,电话本等)等。此外,内部存储器821可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件,闪存器件,通用闪存存储器(universal flash storage,UFS)等。
电子设备800可以通过音频模块870,扬声器870A,受话器870B,麦克风870C,耳机接口870D,以及应用处理器等实现音频功能。例如音乐播放,录音等。
音频模块870用于将数字音频信息转换成模拟音频信号输出,也用于将模拟音频输入转换为数字音频信号。音频模块870还可以用于对音频信号编码和解码。在一些实施例中,音频模块870可以设置于处理器810中,或将音频模块870的部分功能模块设置于处理器810中。
扬声器870A,也称“喇叭”,用于将音频电信号转换为声音信号。电子设备800可以通过扬声器870A收听音乐,或收听免提通话。
受话器870B,也称“听筒”,用于将音频电信号转换成声音信号。当电子设备800接听电话或语音信息时,可以通过将受话器870B靠近人耳接听语音。
麦克风870C,也称“话筒”,“传声器”,用于将声音信号转换为电信号。当拨打电话或发送语音信息时,用户可以通过人嘴靠近麦克风870C发声,将声音信号输入到麦克风870C。电子设备800可以设置至少一个麦克风870C。在另一些实施例中,电子设备800可以设置两个麦克风870C,除了采集声音信号,还可以实现降噪功能。在另一些实施例中,电子设备800还可以设置三个,四个或更多麦克风870C,实现采集声音信号,降噪,还可以识别声音来源,实现定向录音功能等。
耳机接口870D用于连接有线耳机。耳机接口870D可以是USB接口830,也可以是3.5mm的开放移动电子设备平台(open mobile terminal platform,OMTP)标准接口,美国蜂窝电信工业协会(cellular telecommunications industry association of the USA,CTIA)标准接口。
压力传感器880A用于感受压力信号,可以将压力信号转换成电信号。在一些实施例中,压力传感器880A可以设置于显示屏894。压力传感器880A
的种类很多,如电阻式压力传感器,电感式压力传感器,电容式压力传感器等。电容式压力传感器可以是包括至少两个具有导电材料的平行板。当有力作用于压力传感器880A,电极之间的电容改变。电子设备800根据电容的变化确定压力的强度。当有触摸操作作用于显示屏894,电子设备800根据压力传感器880A检测所述触摸操作强度。电子设备800也可以根据压力传感器880A的检测信号计算触摸的位置。在一些实施例中,作用于相同触摸位置,但不同触摸操作强度的触摸操作,可以对应不同的操作指令。例如:当有触摸操作强度小于第一压力阈值的触摸操作作用于短消息应用图标时,执行查看短消息的指令。当有触摸操作强度大于或等于第一压力阈值的触摸操作作用于短消息应用图标时,执行新建短消息的指令。
陀螺仪传感器880B可以用于确定电子设备800的运动姿态。在一些实施例中,可以通过陀螺仪传感器880B确定电子设备800围绕三个轴(即,x,y和z轴)的角速度。陀螺仪传感器880B可以用于拍摄防抖。示例性的,当按下快门,陀螺仪传感器880B检测电子设备800抖动的角度,根据角度计算出镜头模组需要补偿的距离,让镜头通过反向运动抵消电子设备800的抖动,实现防抖。陀螺仪传感器880B还可以用于导航,体感游戏场景。
气压传感器880C用于测量气压。在一些实施例中,电子设备800通过气压传感器880C测得的气压值计算海拔高度,辅助定位和导航。
磁传感器880D包括霍尔传感器。电子设备800可以利用磁传感器880D检测翻盖皮套的开合。在一些实施例中,当电子设备800是翻盖机时,电子设备800可以根据磁传感器880D检测翻盖的开合。进而根据检测到的皮套的开合状态或翻盖的开合状态,设置翻盖自动解锁等特性。
加速度传感器880E可检测电子设备800在各个方向上(一般为三轴)加速度的大小。当电子设备800静止时可检测出重力的大小及方向。还可以用于识别电子设备姿态,应用于横竖屏切换,计步器等应用。
距离传感器880F,用于测量距离。电子设备800可以通过红外或激光测量距离。在一些实施例中,拍摄场景,电子设备800可以利用距离传感器880F测距以实现快速对焦。
接近光传感器880G可以包括例如发光二极管(LED)和光检测器,例如光电二极管。发光二极管可以是红外发光二极管。电子设备800通过发光二极管向外发射红外光。电子设备800使用光电二极管检测来自附近物体的红外反射光。当检测到充分的反射光时,可以确定电子设备800附近有物体。当检测到不充分的反射光时,电子设备800可以确定电子设备800附近没有物体。电子设备800可以利用接近光传感器880G检测用户手持电子设备800贴近耳朵通话,以便自动熄灭屏幕达到省电的目的。接近光传感器880G也可用于皮套模式,口袋模式自动解锁与锁屏。
环境光传感器880L用于感知环境光亮度。电子设备800可以根据感知的环境光亮度自适应调节显示屏894亮度。环境光传感器880L也可用于拍照时自动调节白平衡。环境光 传感器880L还可以与接近光传感器880G配合,检测电子设备800是否在口袋里,以防误触。
指纹传感器880H用于采集指纹。电子设备800可以利用采集的指纹特性实现指纹解锁,访问应用锁,指纹拍照,指纹接听来电等。
温度传感器880J用于检测温度。在一些实施例中,电子设备800利用温度传感器880J检测的温度,执行温度处理策略。例如,当温度传感器880J上报的温度超过阈值,电子设备800执行降低位于温度传感器880J附近的处理器的性能,以便降低功耗实施热保护。在另一些实施例中,当温度低于另一阈值时,电子设备800对电池842加热,以避免低温导致电子设备800异常关机。在其他一些实施例中,当温度低于又一阈值时,电子设备800对电池842的输出电压执行升压,以避免低温导致的异常关机。
触摸传感器880K,也称“触控面板”。触摸传感器880K可以设置于显示屏894,由触摸传感器880K与显示屏894组成触摸屏,也称“触控屏”。触摸传感器880K用于检测作用于其上或附近的触摸操作。触摸传感器可以将检测到的触摸操作传递给应用处理器,以确定触摸事件类型。可以通过显示屏894提供与触摸操作相关的视觉输出。在另一些实施例中,触摸传感器880K也可以设置于电子设备800的表面,与显示屏894所处的位置不同。
骨传导传感器880M可以获取振动信号。在一些实施例中,骨传导传感器880M可以获取人体声部振动骨块的振动信号。骨传导传感器880M也可以接触人体脉搏,接收血压跳动信号。在一些实施例中,骨传导传感器880M也可以设置于耳机中,结合成骨传导耳机。音频模块870可以基于所述骨传导传感器880M获取的声部振动骨块的振动信号,解析出语音信号,实现语音功能。应用处理器可以基于所述骨传导传感器880M获取的血压跳动信号解析心率信息,实现心率检测功能。
按键890包括开机键,音量键等。按键890可以是机械按键。也可以是触摸式按键。电子设备800可以接收按键输入,产生与电子设备800的用户设置以及功能控制有关的键信号输入。
马达891可以产生振动提示。马达891可以用于来电振动提示,也可以用于触摸振动反馈。例如,作用于不同应用(例如拍照,音频播放等)的触摸操作,可以对应不同的振动反馈效果。作用于显示屏894不同区域的触摸操作,马达891也可对应不同的振动反馈效果。不同的应用场景(例如:时间提醒,接收信息,闹钟,游戏等)也可以对应不同的振动反馈效果。触摸振动反馈效果还可以支持自定义。
指示器892可以是指示灯,可以用于指示充电状态,电量变化,也可以用于指示消息,未接来电,通知等。
SIM卡接口895用于连接SIM卡。SIM卡可以通过插入SIM卡接口895,或从SIM卡接口895拔出,实现和电子设备800的接触和分离。电子设备800可以支持1个或N个SIM卡接口,N为大于1的正整数。SIM卡接口895可以支持Nano SIM卡,Micro SIM卡,SIM卡等。同一个SIM卡接口895可以同时插入多张卡。所述多张卡的类型可以相同,也可以不同。SIM卡接口895也可以兼容不同类型的SIM卡。SIM卡接口895也可以兼容外部存储卡。电子设备800通过SIM卡和网络交互,实现通话以及数据通信等功能。在一些实施例中,电子设备800采用eSIM,即:嵌入式SIM卡。eSIM卡可以嵌在电子设备800中,不能和电子设备800分离。
图9是本发明实施例的电子设备800的软件结构框图。
分层架构将软件分成若干个层,每一层都有清晰的角色和分工。层与层之间通过软件接口通信。在一些实施例中,将Android系统分为四层,从上至下分别为应用程序层,应用程序框架层,安卓运行时(Android runtime)和系统库,以及内核层。
应用程序层可以包括一系列应用程序包。
如图8所示,应用程序包可以包括相机,图库,日历,通话,地图,导航,WLAN,蓝牙,音乐,视频,短信息等应用程序。
应用程序框架层为应用程序层的应用程序提供应用编程接口(application programming interface,API)和编程框架。应用程序框架层包括一些预先定义的函数。
如图8所示,应用程序框架层可以包括窗口管理器,内容提供器,视图系统,电话管理器,资源管理器,通知管理器等。
窗口管理器用于管理窗口程序。窗口管理器可以获取显示屏大小,判断是否有状态栏,锁定屏幕,截取屏幕等。
内容提供器用来存放和获取数据,并使这些数据可以被应用程序访问。所述数据可以包括视频,图像,音频,拨打和接听的电话,浏览历史和书签,电话簿等。
视图系统包括可视控件,例如显示文字的控件,显示图片的控件等。视图系统可用于构建应用程序。显示界面可以由一个或多个视图组成的。例如,包括短信通知图标的显示界面,可以包括显示文字的视图以及显示图片的视图。
电话管理器用于提供电子设备800的通信功能。例如通话状态的管理(包括接通,挂断等)。
资源管理器为应用程序提供各种资源,比如本地化字符串,图标,图片,布局文件,视频文件等等。
通知管理器使应用程序可以在状态栏中显示通知信息,可以用于传达告知类型的消息,可以短暂停留后自动消失,无需用户交互。比如通知管理器被用于告知下载完成,消息提醒等。通知管理器还可以是以图表或者滚动条文本形式出现在系统顶部状态栏的通知,例如后台运行的应用程序的通知,还可以是以对话窗口形式出现在屏幕上的通知。例如在状态栏提示文本信息,发出提示音,电子设备振动,指示灯闪烁等。
Android Runtime包括核心库和虚拟机。Android runtime负责安卓系统的调度和管理。
核心库包含两部分:一部分是java语言需要调用的功能函数,另一部分是安卓的核心库。
应用程序层和应用程序框架层运行在虚拟机中。虚拟机将应用程序层和应用程序框架层的java文件执行为二进制文件。虚拟机用于执行对象生命周期的管理,堆栈管理,线程管理,安全和异常的管理,以及垃圾回收等功能。
系统库可以包括多个功能模块。例如:表面管理器(surface manager),媒体库(Media Libraries),三维图形处理库(例如:OpenGL ES),2D图形引擎(例如:SGL)等。
表面管理器用于对显示子系统进行管理,并且为多个应用程序提供了2D和3D图层的融合。
媒体库支持多种常用的音频,视频格式回放和录制,以及静态图像文件等。媒体库可以支持多种音视频编码格式,例如:MPEG4,H.264,MP3,AAC,AMR,JPG,PNG等。
三维图形处理库用于实现三维图形绘图,图像渲染,合成,和图层处理等。
2D图形引擎是2D绘图的绘图引擎。
内核层是硬件和软件之间的层。内核层至少包含显示驱动,摄像头驱动,音频驱动,传感器驱动。
本申请实施例提供的网络管理方法可以实现为内核层中的搜网调度驱动,系统库中的搜网调度库函数,或者应用程序框架层中的搜网调度接口。在另一些实施例中,网络管理方法还可以固化到网卡芯片中,例如通过烧制的方式固化到modem(调制解调器)层中。
本申请的实施例还提供了一种计算机存储介质,包括计算机指令,当计算机指令在终端上运行时,使得终端执行第一方面任一项可能的实现方式中的网络管理方法。
本申请的实施例还提供一种计算机程序产品,当计算机程序产品在终端上运行时,使得终端执行第一方面任一项可能的实现方式中的网络管理方法。
本申请实施例的基本思想是,在数据业务由于主卡体验不佳切换到副卡时,且主卡掉2G/3G或无网时,并非立即启动主卡搜网,而是根据用户当前的业务流量特征和用户场景,动态控制搜网时机。一方面,尽快搜网会最大可能性尽快恢复用户主卡的被叫呼通能力,另一方面频繁持续搜网会中断业务流量,造成体验中断。所以本发明要解决的核心技术问题是,如何刻画业务流量的特征和用户场景,在满足条件时搜网,不满足条件时停止搜网,从而在用户体验和尽快搜网之间达成一个权衡。
举一个例子来阐述:用户乘车移动到地点A附近,由于主卡的运营商在A附近没有足够的基础设施能力,此时主卡的信号质量不佳掉2G,切换到副卡。情况1:主卡连续搜网1分钟未能成功连接运营商A的网络,但由于搜网过程,导致副卡也无法发送数据业务,这种情况下,用户全程无法上网;情况2:系统探测到用户此时在密集使用数据业务(发送微信信息),暂时停止搜网,而后在微信发送之后,用户锁屏,此时启动搜网,全程用户体验是网络畅通。
上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品可以包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁盘)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装 置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器、随机存取存储器、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。

Claims (15)

  1. 一种用于终端的网络管理方法,所述终端具有至少两个用户识别模块,包括第一用户识别模块和第二用户识别模块,所述网络管理方法包括:使所述终端在所述第二用户识别模块上运行所述第一数据业务,检测所述第一数据业务的网络占用率,基于所述网络占用率确定所述第一用户识别模块的搜网方式。
  2. 根据权利要求1所述的网络管理方法,其特征在于,检测所述第一用户识别模块所处的网络类型,响应于检测结果,在所述网络类型是无网络的条件下,采用第一搜网方式对第一网络进行搜网,在所述网络类型是不同于所述第一网络的第二网络的条件下,采用第二搜网方式对所述第一网络进行搜网,所述第二搜网方式不同于所述第一搜网方式。
  3. 根据权利要求2所述的网络管理方法,其特征在于,所述第一搜网方式包括:在所述网络占用率低于网络占用率阈值的条件下,开启第一用户识别模块对第一网络的搜网。
  4. 根据权利要求2或3所述的网络管理方法,其特征在于,所述第一搜网方式包括:在所述网络占用率不低于网络占用率阈值的条件下,检查预设的计时器是否超时,在所述计时器未超时的条件下,关闭所述第一用户识别模块对所述第一网络的搜网。
  5. 根据权利要求4所述的网络管理方法,其特征在于,在所述计时器超时的条件下,重置所述计时器并且开启所述第一用户识别模块对所述第一网络的搜网。
  6. 根据权利要求2至5中任一项所述的网络管理方法,其特征在于,所述第二搜网方式包括:在所述网络占用率低于网络占用率阈值的条件下,开启所述第一用户识别模块对所述第一网络的搜网。
  7. 根据权利要求2至6中任一项所述的网络管理方法,其特征在于,所述第二搜网方式包括:在所述网络占用率不低于网络占用率阈值的条件下,关闭所述第一用户识别模块对所述第一网络的搜网。
  8. 根据权利要求1所述的网络管理方法,其特征在于,检查是否有最近第五时长内更新的所述第一数据业务的业务体验数据可用。
  9. 根据权利要求8所述的网络管理方法,其特征在于,响应于有最近所述第五时长内更新的所述第一数据业务的业务体验数据可用,基于所述业务体验数据检查业务体验是否不低于第一业务体验阈值。
  10. 根据权利要求8或9所述的网络管理方法,其特征在于,响应于所述业务体验低于所述第一业务体验阈值,将第所述二用户识别模块的链路质量与所述第一用户识别模块的链路质量相比较,响应于所述第一用户识别模块的链路质量在所述第二用户识别模块的链路质量以下,返回检查是否有最近所述第五时长内更新的所述第一数据业务的业务体验数据可用的步骤。
  11. 根据权利要求8至10中任一项所述的网络管理方法,其特征在于,响应于所述业务体验低于所述第一业务体验阈值,将所述第二用户识别模块的链路质量与所述第一用户识别模块的链路质量相比较,响应于所述第一用户识别模块的链路质量在所述第二用户识别模块的链路质量以下,返回检测所述第二用户识别模块的业务体验和链路质量的步骤。
  12. 据权利要求11所述的网络管理方法,其特征在于,响应于所述第一用户识别模块的链路质量高于所述第二用户识别模块的链路质量,在所述第一用户识别模块上建立第一数据通路并且将所述第一数据业务转移到所述第一用户识别模块上。
  13. 一种终端,该终端具有至少两个用户识别模块,包括第一用户识别模块和第二用户识别模块,该终端还包括:存储器以及耦合于所述存储器的处理器,所述存储器存储可由所述处理器执行的指令,所述处理器调用所述存储器中的所述指令,执行根据权利要求1至12中任一项所述的网络管理方法。
  14. 一种计算机存储介质,包括计算机指令,当计算机指令在终端上运行时,使得所述终端执行根据权利要求1至12中任一项所述的网络管理方法。
  15. 一种计算机程序产品,当计算机程序产品在终端上运行时,使得所述终端执行根据权利要求1至12中任一项所述的网络管理方法。
PCT/CN2018/122131 2018-12-19 2018-12-19 面向多卡的网络管理 WO2020124447A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2018/122131 WO2020124447A1 (zh) 2018-12-19 2018-12-19 面向多卡的网络管理
CN201880100240.5A CN113243126B (zh) 2018-12-19 2018-12-19 一种用于终端的网络管理方法和终端

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/122131 WO2020124447A1 (zh) 2018-12-19 2018-12-19 面向多卡的网络管理

Publications (1)

Publication Number Publication Date
WO2020124447A1 true WO2020124447A1 (zh) 2020-06-25

Family

ID=71102536

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/122131 WO2020124447A1 (zh) 2018-12-19 2018-12-19 面向多卡的网络管理

Country Status (2)

Country Link
CN (1) CN113243126B (zh)
WO (1) WO2020124447A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115175112A (zh) * 2021-04-01 2022-10-11 北京小米移动软件有限公司 网络控制方法及装置、移动终端及存储介质

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113873603A (zh) * 2021-09-03 2021-12-31 北京小米移动软件有限公司 网络控制方法、装置及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100150112A1 (en) * 2008-12-15 2010-06-17 Lg Electronics Inc. Mobile terminal and method of moving network thereof
CN106131303A (zh) * 2016-06-14 2016-11-16 青岛海信移动通信技术股份有限公司 业务处理方法及装置
WO2016201914A1 (zh) * 2015-06-16 2016-12-22 中兴通讯股份有限公司 一种切换移动网络的方法及移动终端
CN108632930A (zh) * 2018-05-04 2018-10-09 奇酷互联网络科技(深圳)有限公司 搜网控制方法、装置及移动终端

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105188098B (zh) * 2015-09-30 2020-09-01 努比亚技术有限公司 一种移动终端的网络切换装置和网络切换方法
GB2555771B (en) * 2015-12-23 2021-03-03 Pismo Labs Technology Ltd Methods and systems for selecting sim card
CN105933930B (zh) * 2016-05-19 2019-08-27 深圳市万普拉斯科技有限公司 双卡模式下的搜网方法和装置
US10064130B2 (en) * 2016-09-02 2018-08-28 Qualcomm Incorporated System and method for sharing measurement results in multi-SIM devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100150112A1 (en) * 2008-12-15 2010-06-17 Lg Electronics Inc. Mobile terminal and method of moving network thereof
WO2016201914A1 (zh) * 2015-06-16 2016-12-22 中兴通讯股份有限公司 一种切换移动网络的方法及移动终端
CN106131303A (zh) * 2016-06-14 2016-11-16 青岛海信移动通信技术股份有限公司 业务处理方法及装置
CN108632930A (zh) * 2018-05-04 2018-10-09 奇酷互联网络科技(深圳)有限公司 搜网控制方法、装置及移动终端

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115175112A (zh) * 2021-04-01 2022-10-11 北京小米移动软件有限公司 网络控制方法及装置、移动终端及存储介质
CN115175112B (zh) * 2021-04-01 2023-11-21 北京小米移动软件有限公司 网络控制方法及装置、移动终端及存储介质

Also Published As

Publication number Publication date
CN113243126B (zh) 2022-10-25
CN113243126A (zh) 2021-08-10

Similar Documents

Publication Publication Date Title
WO2022257977A1 (zh) 电子设备的投屏方法和电子设备
WO2020143380A1 (zh) 一种数据传输方法及电子设备
CN114449599B (zh) 基于电子设备位置的网络链路切换方法和电子设备
WO2020077512A1 (zh) 语音通话方法、电子设备及系统
US20230189366A1 (en) Bluetooth Communication Method, Terminal Device, and Computer-Readable Storage Medium
CN113810938B (zh) 通道切换方法、电子设备及存储介质
KR102491006B1 (ko) 데이터 송신 방법 및 전자 기기
US11665274B2 (en) Call method and apparatus
WO2020056684A1 (zh) 通过转发模式连接的多tws耳机实现自动翻译的方法及装置
CN111343326A (zh) 获取测试日志的方法及相关装置
JP7193647B2 (ja) 接続確立方法および端末デバイス
WO2022262492A1 (zh) 数据下载方法、装置和终端设备
CN114528581A (zh) 一种安全显示方法及电子设备
WO2020124447A1 (zh) 面向多卡的网络管理
CN113141637B (zh) 一种多路径传输控制的方法及控制装置
WO2024001773A1 (zh) 一种数据迁移方法、电子设备和组网系统
CN115460445B (zh) 电子设备的投屏方法和电子设备
EP4339770A1 (en) Screen sharing method and related device
WO2023280160A1 (zh) 一种通道切换方法及装置
CN116938950A (zh) 一种数据传输的方法、电子设备和存储介质
CN116170782A (zh) 一种投屏方法、相关装置及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18943658

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18943658

Country of ref document: EP

Kind code of ref document: A1